Infosecurity Blogs

Mobile Payment, Your Time has Come

Mobile Payment, Your Time has Come

2015 will be the year when the floodgates open on contactless mobile payments

Lifting the Fog of Ignorance in IT Security

Lifting the Fog of Ignorance in IT Security

Effective operational intelligence improves insight into increasingly complex IT infrastructure and the way it is used to transact with customers. This reduces the concern IT managers have in many areas, with the exception of IT security where deeper insight causes alarm

A Passion For Online Safety, Part 3

A Passion For Online Safety, Part 3

In Parts 1 & 2 Peter Berlich gave an overview of the (ISC)2 Safe and Secure Online program and interviewed director Julie Peeler. Here he profiles the volunteer’s role

Is Your Identity and Access Management Fit for Purpose?

Is Your Identity and Access Management Fit for Purpose?

European organizations are struggling to adapt legacy identity and access management (IAM) systems for integrating external users. Many are turning to IAM-as-a-service to supplement in-house systems

Five Factors to Consider When Looking For a Data Security Provider

Five Factors to Consider When Looking For a Data Security Provider

Protecting employee data, client data, and internal company information has never been as important. Your organization needs to adopt effective services that manage your information, protect your most critical data and, above all, streamline processes.

Privacy Wars: A Tale of Two Tims

Privacy Wars: A Tale of Two Tims

The gloves are officially off in Silicon Valley

Netanyahu at the 5th Annual Cybersecurity Conference:
Challenge Assumptions

Netanyahu at the 5th Annual Cybersecurity Conference: Challenge Assumptions

Israeli Prime Minister Benjamin Netanyahu gave the opening speech at the 5th annual CyberSecurity Conference in Tel Aviv, Israel this morning. He believes cyber security is the future of his country

CISOs Go From 'No' to 'Know'

CISOs Go From 'No' to 'Know'

Vendor offerings line up well with CISO desires at the annual Eskenzi PR CISO forum

Hanging on the Telephone

Hanging on the Telephone

Survey ‘shows’ that mobiles are bad for your heath; but what about your company’s wealth?

Security, Soundbites, and Password Recovery Abuse

Security, Soundbites, and Password Recovery Abuse

A recent blog by Graham Cluley drew my attention to an unpleasant little scam apparently aimed at users of webmail services

Retail Sector Breaches: What Can We Learn?

Retail Sector Breaches: What Can We Learn?

Addressing the common avenues of data breach will go a long way to thwarting hackers

Li-Fi fantastic – Quocirca’s Report from Infosec 2015

Li-Fi fantastic – Quocirca’s Report from Infosec 2015

Many of the mainstream vendors were banging the same drum at Infosec 2015 held at Olympia in Early June; you had to look hard for something completely different

What’s Hot on Infosecurity Magazine?