Advertising/ Lead Gen
View UK Content
View US Content
Downloads/ White Papers
Events & Training
Business Continuity and Disaster Recovery
Compliance and Policy
Identity and Access Management
Internet and Network Security
Malware and Hardware Security
Security Training and Education
Wireless and Mobile Security
You are here:
Testing & Control
Trending Topic - #twcvisit
Is Your Advanced Persistent Threat Strategy Still Leaving the Door Open?
The Transitive Property of Trust: Improving your e-Commerce ROI
Lock Down: How to Keep your Important Data Safe in the Cloud
Bring Your Own Device - Without Losing Your Data
Plugging "Cloud Identity Leaks": Why Your Business Should Become an Identity Provider
Cloud Security Alliance (CSA)
• 15 May 2013
By Mark O’Neill Most people have used the Facebook, Twitter, or Google Apps buttons located on websites to log into third-party services. This approach is useful within consumer IT as it enable...
Securing Credit Card Voice Transactions
• 09 May 2013
This afternoon, I met the CEO (and co-founder) of Semafone, Tim Critchley. When the invitation to interview him landed in my inbox, I was all set to turn it down. As Critchley himself admits, call cen...
Talking Infosec Awareness and Training with Kaspersky Labs’ David Emm
• 03 May 2013
Shortly before the chaos of Infosecurity Europe, I joined David Emm, senior security researcher at Kaspersky Lab, for lunch in a lovely quiet gastro pub in the Oxfordshire countryside. Whilst I frequ...
Should Information Security Professionals be Licensed to Practice?
• 02 May 2013
Last week we published accompanying editorials from our most recent print edition that asked a rather simple question: Should information security professionals be licensed to practice? Arguing in fa...
Already registered? Click the button below to login.
Not a member?
Terms & Conditions
. All rights reserved. Copyright © 2013
Privacy & Cookies