Features

Cloud Computing

Navigating the Regulatory Waters of Information Security Navigating the Regulatory Waters of Information Security

Steve Durbin of the ISF looks back at how the regulatory framework has evolved, discussing privacy, EU and US data and security directives. Durbin provides insight and guidance into how the modern CISO can build a platform that makes implementing mandated regulatory changes easier, resulting in compliance programs that manage the business safely and soundly, well before a regulator needs to intervene
22 July 2014

Comment: New Leadership Amidst Microsoft’s Identity Crisis Comment: New Leadership Amidst Microsoft’s Identity Crisis

At a crossroads of generational shifts in computing and security threats, Vaultive’s Elad Yoran asks, can Microsoft adapt?
11 July 2014

Duck and Cover: Defending Against DDoS Attacks Duck and Cover: Defending Against DDoS Attacks

Denial-of-service attacks are frequently deployed, yet often organizations fail to prepare themselves against the threat. Ted Kritsonis talks to industry experts about using analytics to prevent and respond to DDoS attacks
08 July 2014

The Internet of Things: The Good, The Bad, And Everything In Between The Internet of Things: The Good, The Bad, And Everything In Between

Theoretical physicist Michio Kaku predicts that computers, in the future, “will be everywhere and nowhere”. Join Wendy M. Grossman as she explores this Internet of Things to come
23 June 2014

Members' Content

Life after Snowden Life after Snowden

What will life on the internet look like, now that the cat is out of the bag? Danny Bradbury reports from the edge of a worrying new frontier
10 June 2014

Members' Content

Interview: Rik Ferguson Interview: Rik Ferguson

At this winter's RSA Conference in San Francisco, Eleanor Dallaway interviewed an information security researcher, a rock star, a father of three, a graduate of French, and a man whose lifetime ambition is to sell pottery in the Dordogne. Of course, these all describe one person. Infosecurity presents Rik Ferguson…
14 May 2014

Comment: Mitigate Cyber Attacks Now in Emerging Markets Comment: Mitigate Cyber Attacks Now in Emerging Markets

As the use of mobile technology continues to rise in emerging markets, there is a growing concern around the compromise of privacy and data security. GlobalLogic’s Juan Manuel Caracoche and Tzvi Kasten explain the state of security in Brazil and other emerging countries and why building security protection into products will mitigate phishing and malware attacks
13 May 2014

BYOD: A Victim of its Own Success BYOD: A Victim of its Own Success

Stephen Pritchard discovers the problems businesses face around BYOD, or bring your own device, are largely problems of success
24 April 2014

Cloud Security: A Crowded Standards Landscape? Cloud Security: A Crowded Standards Landscape?

Lacking a singular gold standard, the cloud security expanse can seem messy at times. But as Davey Winder discovers, it’s actually a form of controlled chaos
10 April 2014

Comment: Third Parties and Identity Management – Welcome to the World of Marketing Comment: Third Parties and Identity Management – Welcome to the World of Marketing

Marketing teams have many options for managing their activities around social media, website administration and analytics. David Meyer of OneLogin contemplates whether company security policies are being followed and how IT can get involved in managing risks
03 April 2014

Showing 1 - 10 of 149 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×