Features

Encryption

Review: The CISSP Companion You Can’t Do Without Review: The CISSP Companion You Can’t Do Without

Shan Lee finds there is much to learn from Javvad Malik’s humor in his new e-book "The CISSP Companion Handbook"
24 July 2014

Tales of the Cyber Underground: Inside the Underground Ransomware Market Tales of the Cyber Underground: Inside the Underground Ransomware Market

With the volume of ransomware decreasing according to recent data, the quality appears to be increasing in tandem. Tom Brewster charts the evolution in the latest Tales of the Cyber Underground installment
23 July 2014

Comment: New Leadership Amidst Microsoft’s Identity Crisis Comment: New Leadership Amidst Microsoft’s Identity Crisis

At a crossroads of generational shifts in computing and security threats, Vaultive’s Elad Yoran asks, can Microsoft adapt?
11 July 2014

Life after Snowden Life after Snowden

What will life on the internet look like, now that the cat is out of the bag? Danny Bradbury reports from the edge of a worrying new frontier
10 June 2014

Members' Content

Reassessing the Value of PCI in the Target Breach Aftermath Reassessing the Value of PCI in the Target Breach Aftermath

Tim Lansdale is the head of payment security at WorldPay. In the aftermath of the Target data breach, Eleanor Dallaway met him over a coffee to talk about the value of PCI and the online payment threat landscape
21 May 2014

Interview: Rik Ferguson Interview: Rik Ferguson

At this winter's RSA Conference in San Francisco, Eleanor Dallaway interviewed an information security researcher, a rock star, a father of three, a graduate of French, and a man whose lifetime ambition is to sell pottery in the Dordogne. Of course, these all describe one person. Infosecurity presents Rik Ferguson…
14 May 2014

The Hype and the Hurt: Bitcoin’s Incredible Boom The Hype and the Hurt: Bitcoin’s Incredible Boom

The ups and downs of the cryptocurrency market have made headlines – and not all of them good ones. Tom Brewster takes a look at both sides of the digital coin
06 May 2014

Cloud Security: A Crowded Standards Landscape? Cloud Security: A Crowded Standards Landscape?

Lacking a singular gold standard, the cloud security expanse can seem messy at times. But as Davey Winder discovers, it’s actually a form of controlled chaos
10 April 2014

Government Surveillance: With the Damage Comes Promise Government Surveillance: With the Damage Comes Promise

On the heels of his recent keynote at the RSA Conference in San Francisco, Scott Charney, corporate VP of Microsoft’s Trustworthy Computing Group, sat down with our Drew Amorosi to talk about the reputational damage inflicted by NSA surveillance disclosures, and what the industry must do to respond
14 March 2014

Interview: Brian Honan Interview: Brian Honan

Brian Honan is a man who wears many hats, but all of them are white. Eleanor Dallaway travels to Dublin to spend an afternoon with one of the information security industry’s favorite treasures
11 March 2014

Showing 1 - 10 of 113 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×