Infosecurity Blogs

A Day in the Life of an IT Pro: Poisoned by the Ethernet

A Day in the Life of an IT Pro: Poisoned by the Ethernet

As I’ve previously mentioned, being an IT Pro can often require some super sleuthing. Sometimes this can be through the actual systems and networks, and sometimes it means donning the cloak and hat and physically hunting down the issue.

The Rise and Rise of Bad Bots – Part 2: Beyond Web-Scraping

The Rise and Rise of Bad Bots – Part 2: Beyond Web-Scraping

Some bots have good intentions when they visit your web site, but many do not. How do you tell good bots from bad bots and control or block them?

The Rise and Rise of Bad Bots – Part 1: Little DDoS

The Rise and Rise of Bad Bots – Part 1: Little DDoS

Bots do many useful things on the web, but all too often they are up to no good. This two part blog starts but looking at bot-driven denial of service and the growing problem of short duration distraction attacks.

#RSAC: Android: Malware? What Malware?

#RSAC: Android: Malware? What Malware?

Android malware (or Potentially Harmful Applications): a problem, or overstated?

Online Security in the Insurance Sector

Online Security in the Insurance Sector

By admission of its own IT leaders, insurance companies are less advanced when it comes to IT security than banks. There are plenty of reasons to catch up.

A Day in the Life of an IT Pro: A Virtual Lesson in Virtualization

A Day in the Life of an IT Pro: A Virtual Lesson in Virtualization

The life of an IT admin is full of challenges, and technological changes are driving the role into new territory

A Day Out at CRESTCon & IISP Congress 2015

A Day Out at CRESTCon & IISP Congress 2015

Security conferences in London are not in short supply, with several occurring this week alone. Given this state of affairs, standing out from the crowd is not an easy task – but it’s a challenge that CRESTCon & IISP Congress approached head-on

Cybersecurity in an Age of Austerity

Cybersecurity in an Age of Austerity

Back in 2010 the UK government promised £650m spending on cybersecurity over four years, with further funding to follow by 2016. Turn the clock forward five years, and the coalition has successfully delivered on its pledge amidst a culture of cuts to other sectors

Facebook Expertly Increases Its Data Stash

Facebook Expertly Increases Its Data Stash

On the Friday before Super Bowl 2015, while America was obsessing over a gridiron game, Facebook quietly released an update to its privacy policies. Was this timing a cunning move using distraction as the background?

Ask the CISO: Third-Party Vendor Management

Ask the CISO: Third-Party Vendor Management

Should we be documenting our relationships with third-party vendors and should third-party vendors be required to incorporate security controls?

Security and the Cool Factor

Security and the Cool Factor

Getting users to implement security into their lives may be a difficult task without the help of the marketing and advertising machinery of major tech companies

Ask the CISO

Ask the CISO

Do you have a burning information security question that you would like to ask a CISO? If so, this is the forum for you to ask those questions.

What’s Hot on Infosecurity Magazine?