Features

Application Security

Comment: New Approaches Needed for Database Security and Advanced Network Threats Comment: New Approaches Needed for Database Security and Advanced Network Threats

Today’s advanced threats require a smarter approach to database security that extends beyond detection and monitoring the usual attack surfaces and SQL injection techniques. This is the view from NetCitadel’s Duane Kuroda
17 April 2014

Comment: Third Parties and Identity Management – Welcome to the World of Marketing Comment: Third Parties and Identity Management – Welcome to the World of Marketing

Marketing teams have many options for managing their activities around social media, website administration and analytics. David Meyer of OneLogin contemplates whether company security policies are being followed and how IT can get involved in managing risks
03 April 2014

The Generation X, Y, Z of Information Security The Generation X, Y, Z of Information Security

Not all millennials approach privacy and security with the same attitudes. As Tom Brewster discovers, regardless of age, a one-sized-fits all approach to information security is not the solution
02 April 2014

Members' Content

Anti-Virus: Little More Than a Team Player Anti-Virus: Little More Than a Team Player

Anti-virus is just one small part of the holistic security strategy, argues Ryan W Smith
28 March 2014

Anti-virus Lives to Fight Another Day Anti-virus Lives to Fight Another Day

Anti-virus remains a cornerstone of any security strategy, finds David Harley, as he acknowledges the contributions of anti-malware researchers
28 March 2014

Interview: Brian Honan Interview: Brian Honan

Brian Honan is a man who wears many hats, but all of them are white. Eleanor Dallaway travels to Dublin to spend an afternoon with one of the information security industry’s favorite treasures
11 March 2014

RSA Conference 2014 Q&A: Jim Reavis, CEO, Cloud Security Alliance RSA Conference 2014 Q&A: Jim Reavis, CEO, Cloud Security Alliance

Drew Amorosi sits down with Jim Reavis, co-founder and CEO of the non-profit Cloud Security Alliance (CSA), on day two of the RSA Conference in San Francisco, as the two discuss the growth of cloud services, its security issues, and the CSA’s Software Defined Perimeter (SDP) initiative
25 February 2014

Hacker Training 101 Hacker Training 101

How do White Hats and Black Hats learn their trade? And are pen testing tools like Metasploit more useful for attackers or defenders? Drew Amorosi attends a master hacking class to find out…
25 February 2014

Comment: Vulnerability in the Haystack Comment: Vulnerability in the Haystack

CISOs need to reconsider their approach to vulnerability and patch management for smarter security intelligence, says IBM’s Martin Borrett
20 February 2014

Secure Giving: Information Security Challenges in the Third Sector Secure Giving: Information Security Challenges in the Third Sector

Charities face all the same information security challenges as the public and private sectors, with a couple of extra to boot. Wendy M. Grossman speaks to third-sector CISOs to find out exactly how they are being targeted by shameless cybercriminals
13 February 2014

Members' Content
Showing 1 - 10 of 213 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×