Features

Compliance and Policy

Preparing for Europe's General Data Protection Regulation Preparing for Europe's General Data Protection Regulation

Will it come, or will it go? Kevin Townsend discusses major roadblocks to the EU’s proposed data protection legislation, and how organizations can prepare
15 April 2014

Members' Content

Cloud Security: A Crowded Standards Landscape? Cloud Security: A Crowded Standards Landscape?

Lacking a singular gold standard, the cloud security expanse can seem messy at times. But as Davey Winder discovers, it’s actually a form of controlled chaos
10 April 2014

Members' Content

Comment: Third Parties and Identity Management – Welcome to the World of Marketing Comment: Third Parties and Identity Management – Welcome to the World of Marketing

Marketing teams have many options for managing their activities around social media, website administration and analytics. David Meyer of OneLogin contemplates whether company security policies are being followed and how IT can get involved in managing risks
03 April 2014

The Generation X, Y, Z of Information Security The Generation X, Y, Z of Information Security

Not all millennials approach privacy and security with the same attitudes. As Tom Brewster discovers, regardless of age, a one-sized-fits all approach to information security is not the solution
02 April 2014

Members' Content

Financial Markets: A Playground for Cybercriminals Financial Markets: A Playground for Cybercriminals

The financial markets are supposed to be transparent, and efficient. But what happens if cybercriminals begin playing with them, and would we even know it was happening? Danny Bradbury investigates
21 March 2014

Members' Content

Comment: EU Data Protection Regulation – Will You Be Ready? Comment: EU Data Protection Regulation – Will You Be Ready?

The draft EU Data Protection Regulation has been delayed again. However, companies need to start considering now how to ensure they can comply with key provisions when it does reach final form, or risk being exposed to both regulatory fines and litigation
19 March 2014

Government Surveillance: With the Damage Comes Promise Government Surveillance: With the Damage Comes Promise

On the heels of his recent keynote at the RSA Conference in San Francisco, Scott Charney, corporate VP of Microsoft’s Trustworthy Computing Group, sat down with our Drew Amorosi to talk about the reputational damage inflicted by NSA surveillance disclosures, and what the industry must do to respond
14 March 2014

Interview: Brian Honan Interview: Brian Honan

Brian Honan is a man who wears many hats, but all of them are white. Eleanor Dallaway travels to Dublin to spend an afternoon with one of the information security industry’s favorite treasures
11 March 2014

Hacker Training 101 Hacker Training 101

How do White Hats and Black Hats learn their trade? And are pen testing tools like Metasploit more useful for attackers or defenders? Drew Amorosi attends a master hacking class to find out…
25 February 2014

Q&A: Phil Cracknell, consultant, Company85 Q&A: Phil Cracknell, consultant, Company85

Providing no shortage of unfiltered opinions, Drew Amorosi sat down with Phil Cracknell at the recent Infosecurity Europe 2014 press conference. The newly appointed head of security and privacy with IT consultancy Company85 provides his assessment of BYOD’s myths and the Edward Snowden effect, among others
24 February 2014

Showing 1 - 10 of 347 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×