British Information Security Companies
This article will look at the information security companies founded in the United Kingdom. It will also explore the R&D and innovation happening in British universities and labs.
Gaming and Information Security
Kaspersky declared that gamers were targeted by 11.7 million attacks in 2012, and that there are at least 4.6 million pieces of gaming-focused malware out there in the world. The market for gaming goods on the dark markets is indeed huge, from malware that steals credentials to cracked games and much, much more. This article takes a look at the information security concerns that gaming presents.
Why Should Security Professionals Care about Privacy?
The juncture of security and privacy is complex – a minefield of regulation, threats and challenges. Within many organizations the security and privacy functions sit in different parts of the business, reporting to different leaders and holding different risk appetites. Yet privacy is one of the biggest issues surrounding the security of data and it’s an issue that security professionals can’t afford to ignore. This article will consider the biggest privacy issues that information security professionals need to have at the top of their agenda and explore how security and privacy functions can work together in alignment.
Outsourcing: When to DIY and when to Call a Consultancy
With plenty of very capable consultancy firms in the information security, it can be tempting to outsource most of the organization’s information security needs. At the other end of the spectrum, there are organizations that believe their investment in a CISO should cover all the bases and negate need for external help. This feature will explore the merits and downfalls of both investing in a consultancy and keeping all infosec in house, and draw conclusions about when to DIY, and when to call the experts.
Cyber Warfare in an Increasingly Hostile Political World
In an increasingly hostile world, with political wars and disputes reaching new tense heights, concern for cyber warfare is a natural extension of concern. In today’s electronic age, an act of cyberwar may be to electronically disrupt the workings of government and industry, or infiltrate National Grids. This article will take a look at how current physical-world wars are being played out in the cyber domain.
Phishing Your Own Users
It’s becoming increasingly common practice for businesses to phish or purposely spam their own users as part of awareness campaigns seeking to socially engineer staff. These programs are initiated in order to highlight information security risks to employees. This article considers the benefits of phishing your own users, and also the risks, and offers advice on best practice around the discipline.