Infosecurity Blogs

The Fly in Google’s Alphabet Soup

The Fly in Google’s Alphabet Soup

Good alphabet soup, like a Scrabble board, has 26 letters just like the English alphabet. We use them to form words, sentences, thoughts, and ideas. But Google’s Alphabet is a murkier recipe – it is a parent holding company – for a behemoth data collection endeavor

Five Challenges Facing Security Startups

Five Challenges Facing Security Startups

Not every security startup makes its founders multi-millionaires. For every billion-dollar success story, thousands of companies will develop security products you will never hear about, let alone buy

Cyber Threat Intelligence – No Longer Just a Nice To Have

Cyber Threat Intelligence – No Longer Just a Nice To Have

Information Leakage is possibly one of the most common, and misunderstood security risks faced today, and potentially one which impacts organizations every single day. When linked to electronic distance information gathering, it can, and does pose significant security risks to any business, or government agencies alike.

Network Security: Securing the Ever-Expanding Boundary

Network Security: Securing the Ever-Expanding Boundary

Organizations of all sizes need to ensure they are fully prepared to deal with ever-emerging challenges by equipping themselves to better deal with attacks on their business as well as their reputation

The rise of digital natives and their enthusiasm for cloud services

The rise of digital natives and their enthusiasm for cloud services

As digital natives enter management positions and shadow IT deployments become an accepted norm, the choice is no longer whether or not to adopt cloud-based services, but about the security measures that are put in place to support their use.

Back in Black In Las Vegas

Back in Black In Las Vegas

Black Hat hacking automotive Las Vegas mobile Android Stagefright

Cybersecurity in the Modern Age – Get with the 2020 Program

Cybersecurity in the Modern Age – Get with the 2020 Program

If we have come so far down the matured route toward infosecurity, just how have we arrived at the current situation?

Confidence in Data Security Part 2 – Weak Links

Confidence in Data Security Part 2 – Weak Links

All organizations are dependent on information supply chains; these improve customer communications and business processes. However, to exploit information supply chains to the full requires confidence in data security

A Day in the Life of an IT Pro: The Unsuspected Inside Man

A Day in the Life of an IT Pro: The Unsuspected Inside Man

The principles behind social media can be used to increase organizational security

Securing the Internet of Things – Time for Another Look at Public Key Infrastructure (PKI)?

Securing the Internet of Things – Time for Another Look at Public Key Infrastructure (PKI)?

The increasing use of the Internet of Things (IoT) to support a wide range of business processes has huge potential value for businesses; however, it also opens up a new security front. Authenticating things every time they communicate helps mitigate the threat and this has led to renewed interest in Public Key Infrastructure (PKI)

Confidence in Data Security Part 1 – Room for Improvement

Confidence in Data Security Part 1 – Room for Improvement

Improving user knowledge, deploying advanced technology and co-ordinating incident response and policy all make a big difference in the level of confidence organisations have about data security

Data-First or Employee-First?

Data-First or Employee-First?

One only has to look at the imbroglio that surrounds a breach like Target to see that we are in a new era

What’s Hot on Infosecurity Magazine?