Infosecurity Blogs

A Day in the Life of Kent Row…IT Admin AKA Super Hero

A Day in the Life of Kent Row…IT Admin AKA Super Hero

The life of an IT admin is full of challenges, and technological changes are driving the role into new territory. It's essential that business relationships keep up with the pace of change

IRISSCON 2014: Security Tales from the Emerald Isle

IRISSCON 2014: Security Tales from the Emerald Isle

Ireland's premier cyber-security conference was an effective platform for discussion on the key challenges facing the industry

The Problem of Buggy Software Components

The Problem of Buggy Software Components

Security teams face a risk with software components developed out of house

NCSAM Wrap Up: A Boatload Of Security Tips At Your Fingertips

NCSAM Wrap Up: A Boatload Of Security Tips At Your Fingertips

With National Cyber Security Awareness Month (NCSAM) coming to a close, it’s a good time to reflect on some of the topics published by (ISC)2 to help educate users from all walks of life

Wearable Tech: Preparing for a Smarter Future

Wearable Tech: Preparing for a Smarter Future

With the Apple Watch set to truly kickstart the wearable boom, what are the security implications of a potential surge in new, smarter technology?

Trading in privacy doesn't increase security

Trading in privacy doesn't increase security

Apple and Google are encrypting phones by default; Twitter, Facebook and others are increasing the security and privacy of their users. But law enforcement agencies in the US and UK are concerned by a perceived loss of access to the data. Is it worth trading in the privacy of our digital lives for the promise of security in the real world?

#InfosecHeroes Nominate & Donate

#InfosecHeroes Nominate & Donate

Nominate an information security professional that you consider has brought some outstanding achievements to the industry, whilst raising money for WhiteHatRally

Critical National Infrastructure: How to Protect Vital Systems

Critical National Infrastructure: How to Protect Vital Systems

Critical National Infrastructure is dependent on network communications, which should be protected in the same way as dedicated IT networks. This includes security information and event monitoring (SIEM)

Shadow IT in Stores and Branches: How to Stay Compliant

Shadow IT in Stores and Branches: How to Stay Compliant

Branches are where the rubber still hits the road for many organisations; where retailers still do most of their selling, where much banking is still carried out and where health care is often dispensed. However, for IT managers, branches are outliers, where rogue activity is hard to curb; this means branches can become security and compliance black spots.

Setting a Dangerous Precedent: It's Foreign

Setting a Dangerous Precedent: It's Foreign

We're seeing a dangerous precedent being set by US and UK governments because law enforcement and legislators believe information held in foreign servers should be subject to a different set of standards than that held on their own soil.

(ISC)2 Congress 2014: Why Information Security Needs to Exchange ‘Jack of all Trades’ for Specialists

(ISC)2 Congress 2014: Why Information Security Needs to Exchange ‘Jack of all Trades’ for Specialists

Today, at the (ISC)2 Congress in Atlanta, I sat down with Richard Nealon, and put the (infosec) world to rights, discussing the transformation of the information security professional, the future of the CISO role, and how information security needs to get more value from its pound (or dollar, or euro).

Don't track my children

Don't track my children

Increasingly we see tracking of students in schools, both their location and their activity. This data is being captured and retained in the hope of providing better security and better education to our children. But what is the price we pay for these promises and are they even being delivered upon?