Features

Business Continuity and Disaster Recovery

Financial Markets: A Playground for Cybercriminals Financial Markets: A Playground for Cybercriminals

The financial markets are supposed to be transparent, and efficient. But what happens if cybercriminals begin playing with them, and would we even know it was happening? Danny Bradbury investigates
21 March 2014

Members' Content

Interview: Brian Honan Interview: Brian Honan

Brian Honan is a man who wears many hats, but all of them are white. Eleanor Dallaway travels to Dublin to spend an afternoon with one of the information security industry’s favorite treasures
11 March 2014

Comment: Grand Theft Data – How to Protect an Organization from Breaches Comment: Grand Theft Data – How to Protect an Organization from Breaches

Accepting the premise that data breaches will occur doesn't mean that organizations can’t take preventive measures to reduce the frequency and lessen the severity. Eric Cole of the SANS Institute explains…
10 March 2014

Hacker Training 101 Hacker Training 101

How do White Hats and Black Hats learn their trade? And are pen testing tools like Metasploit more useful for attackers or defenders? Drew Amorosi attends a master hacking class to find out…
25 February 2014

Comment: Cybersecurity Lessons from the Financial Sector Comment: Cybersecurity Lessons from the Financial Sector

Creating a cybersecurity policy is hard, largely because it’s so difficult to define success. A national cybersecurity initiative should define the goals we want to achieve and provide incentives for the private and public sector to cooperate. According to Matthew Cohen of NT OBJECTives, once that is done, the private sector can do what it does best: compete to provide the most robust and cost-effective solutions to the problem
09 January 2014

Through Dark Clouds, a Ray of Light Through Dark Clouds, a Ray of Light

Increasingly complex threats lead Raj Samani to conclude that the state of data security is worse off than it was a decade ago – but not all is lost, as he explains
23 December 2013

Evolution of the Cybersecurity Professional Evolution of the Cybersecurity Professional

Hord Tipton pays tribute to the data security victories over the last 10 years, but acknowledges it’s a never-ending struggle replete with immense challenges
23 December 2013

CISO Then (2003) and CISO Now (2013) CISO Then (2003) and CISO Now (2013)

The evolutionary speed of technology can be rivaled by few things. The role of the CISO might give it some competition though, concludes Todd Fitzgerald of (ISC)²
23 December 2013

Comment: Cyber Warfare – The Modern Cold War Comment: Cyber Warfare – The Modern Cold War

Ross Parsell of Thales UK discusses why cyber threats to the world’s critical national infrastructure are the modern-day Cold War weaponry, for which governments and militaries are rapidly increasing their defense budgets
12 December 2013

Information Security: The Next Ten Years Information Security: The Next Ten Years

The information security industry is going to spend the next ten years solving the problems of the last twenty, finds Danny Bradbury
10 December 2013

Showing 1 - 10 of 103 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×