Features

Encryption

Cloud Security: A Crowded Standards Landscape? Cloud Security: A Crowded Standards Landscape?

Lacking a singular gold standard, the cloud security expanse can seem messy at times. But as Davey Winder discovers, it’s actually a form of controlled chaos
10 April 2014

Members' Content

Government Surveillance: With the Damage Comes Promise Government Surveillance: With the Damage Comes Promise

On the heels of his recent keynote at the RSA Conference in San Francisco, Scott Charney, corporate VP of Microsoft’s Trustworthy Computing Group, sat down with our Drew Amorosi to talk about the reputational damage inflicted by NSA surveillance disclosures, and what the industry must do to respond
14 March 2014

Interview: Brian Honan Interview: Brian Honan

Brian Honan is a man who wears many hats, but all of them are white. Eleanor Dallaway travels to Dublin to spend an afternoon with one of the information security industry’s favorite treasures
11 March 2014

RSA Conference 2014 Q&A: Jim Reavis, CEO, Cloud Security Alliance RSA Conference 2014 Q&A: Jim Reavis, CEO, Cloud Security Alliance

Drew Amorosi sits down with Jim Reavis, co-founder and CEO of the non-profit Cloud Security Alliance (CSA), on day two of the RSA Conference in San Francisco, as the two discuss the growth of cloud services, its security issues, and the CSA’s Software Defined Perimeter (SDP) initiative
25 February 2014

Hacker Training 101 Hacker Training 101

How do White Hats and Black Hats learn their trade? And are pen testing tools like Metasploit more useful for attackers or defenders? Drew Amorosi attends a master hacking class to find out…
25 February 2014

Secure Giving: Information Security Challenges in the Third Sector Secure Giving: Information Security Challenges in the Third Sector

Charities face all the same information security challenges as the public and private sectors, with a couple of extra to boot. Wendy M. Grossman speaks to third-sector CISOs to find out exactly how they are being targeted by shameless cybercriminals
13 February 2014

Members' Content

Comment: Securing the Web – Part 2 Comment: Securing the Web – Part 2

What’s the value of encryption in securing the web? It makes hackers work for their money, says Qualys’ Ivan Ristic
05 February 2014

Comment: Securing the Web – Part 1 Comment: Securing the Web – Part 1

Security technology is very close to enabling robust secure web communications, at least for those who have the time to spend in getting it right, says Qualys’ Ivan Ristic
30 January 2014

Tackling the Authentication Problem Tackling the Authentication Problem

Why does authentication remain such a critical vulnerability for information security when there are so many regulatory initiatives and technical solutions attempting to address the problem? Davey Winder investigates the current state of play in the world of authentication
20 January 2014

Through Dark Clouds, a Ray of Light Through Dark Clouds, a Ray of Light

Increasingly complex threats lead Raj Samani to conclude that the state of data security is worse off than it was a decade ago – but not all is lost, as he explains
23 December 2013

Showing 1 - 10 of 106 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×