International Cybersecurity Regulation Needs to Become Standard
Harshul Joshi, DarkMatter, explains why international cybersecurity regulation needs to become the standard now
Roundtable: Former Deputy Director of NSA Talks Insider Threats
Chris Inglis discusses the insider threat talking his experiences with the NSA, transparency and the use of behavior analytics
The Shape of Things to Come – Advanced Networking Security for IoT
There are all sorts of potential for IoT-related applications to streamline business processes and provide new ways of interacting with customers.
The Rise of DDoS in IOT
Bryan Campbell, Fujitsu, explores the rise of DDoS in IoT
#ISC2CongressEMEA: The Monkey, The Human & The Cybersecurity Awareness Program
When it comes to security training and awareness, the prime objective of many organizations is to be able to demonstrate that all staff have completed security awareness training.
#ISC2CongressEMEA: Combined Mitigation for Cyber and Physical Attacks
At the (ISC)2 Congress EMEA in Dublin on October 18 2016, Barrie Millett drew upon his experience from the military and his resilience roles at E.ON and GE to advise on combined mitigation for cyber and physical attacks.
The Yahoo hack – a numbers game
Have you got a Yahoo email account? Was it one of the 500 million accounts compromised by the breach disclosed by Yahoo in September 2016? Does it matter if it was?
Nok Nok adds a risk engine for FIDO driven authentication
The addition of a risk engine to Nok Nok’s FIDO-driven Authentication Server further strengthens the way web service providers can authenticate the consumers they transact with.
Digital Rights Management 2.0
There nothing new about the need for digital rights management (DRM). However, what DRM tools are expected to achieve has changed over the last decade or so.
Biometrics: the New Frontier in Security, but Why Aren’t We There Yet?
Biometrics is often considered to be the cutting-edge technology that the security industry needs to adopt to help drive innovation in the digital age
#ISC2Congress: How to Hire and Get Hired in Infosec
The session contained a lot of really useful insight and advice on how to hire, and get hired, in information security.
#ISC2Congress: How to Mentor an Information Security Professional
Jeff Silver, senior security engineer at RSA corporation, gave a talk at (ISC)2 Congress in Orlando, Florida, on how to build up infosec professionals through mentoring programs.