Features

Business Continuity and Disaster Recovery

Comment: Total Internet Failure – When Online Goes Offline Comment: Total Internet Failure – When Online Goes Offline

KPMG’s Stephen Bonner highlights that complacency about the internet’s reliability is no excuse for the lack of a contingency plan
16 July 2014

Interview: Rik Ferguson Interview: Rik Ferguson

At this winter's RSA Conference in San Francisco, Eleanor Dallaway interviewed an information security researcher, a rock star, a father of three, a graduate of French, and a man whose lifetime ambition is to sell pottery in the Dordogne. Of course, these all describe one person. Infosecurity presents Rik Ferguson…
14 May 2014

Comment: Incident Response – Mitigate, Remediate and then Communicate Comment: Incident Response – Mitigate, Remediate and then Communicate

How do you handle an emergency incident, and communicate the details to management? By appointing a junior member of your team to handle this process, security analyst Bob Covello believes that incident response teams can increase their effectiveness
25 April 2014

Financial Markets: A Playground for Cybercriminals Financial Markets: A Playground for Cybercriminals

The financial markets are supposed to be transparent, and efficient. But what happens if cybercriminals begin playing with them, and would we even know it was happening? Danny Bradbury investigates
21 March 2014

Interview: Brian Honan Interview: Brian Honan

Brian Honan is a man who wears many hats, but all of them are white. Eleanor Dallaway travels to Dublin to spend an afternoon with one of the information security industry’s favorite treasures
11 March 2014

Comment: Grand Theft Data – How to Protect an Organization from Breaches Comment: Grand Theft Data – How to Protect an Organization from Breaches

Accepting the premise that data breaches will occur doesn't mean that organizations can’t take preventive measures to reduce the frequency and lessen the severity. Eric Cole of the SANS Institute explains…
10 March 2014

Hacker Training 101 Hacker Training 101

How do White Hats and Black Hats learn their trade? And are pen testing tools like Metasploit more useful for attackers or defenders? Drew Amorosi attends a master hacking class to find out…
25 February 2014

Comment: Cybersecurity Lessons from the Financial Sector Comment: Cybersecurity Lessons from the Financial Sector

Creating a cybersecurity policy is hard, largely because it’s so difficult to define success. A national cybersecurity initiative should define the goals we want to achieve and provide incentives for the private and public sector to cooperate. According to Matthew Cohen of NT OBJECTives, once that is done, the private sector can do what it does best: compete to provide the most robust and cost-effective solutions to the problem
09 January 2014

Through Dark Clouds, a Ray of Light Through Dark Clouds, a Ray of Light

Increasingly complex threats lead Raj Samani to conclude that the state of data security is worse off than it was a decade ago – but not all is lost, as he explains
23 December 2013

Evolution of the Cybersecurity Professional Evolution of the Cybersecurity Professional

Hord Tipton pays tribute to the data security victories over the last 10 years, but acknowledges it’s a never-ending struggle replete with immense challenges
23 December 2013

Showing 1 - 10 of 106 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×