Features

Identity and Access Management

Q&A: Ken Pfeil, CISO, Pioneer Investments Q&A: Ken Pfeil, CISO, Pioneer Investments

Ken Pfeil of Pioneer Investments sat down with Infosecurity’s Drew Amorosi in Stamford, Connecticut, as the two covered a broad range of topics. Highlights include Windows XP end of life, vulnerability assessment, choosing the right technology, and how to evaluate potential technology vendors.
18 July 2014

Review: A Password System that Favors Puzzle Over Ease Review: A Password System that Favors Puzzle Over Ease

Bruce Marshall finds that one book offers up anything but an easy password creation system
15 July 2014

Comment: Size Doesn’t Matter in the Battle Against Cybercrime Comment: Size Doesn’t Matter in the Battle Against Cybercrime

Despite having enough resources and dedicated, generous budgets to invest in the latest security solutions, large companies often fail to adequately secure their networks. When it comes to cybersecurity, Fujitsu’s David Robinson argues, large organizations face similar obstacles as their smaller counterparts
07 July 2014

Security Vendors and Their Technology: Working Better, Together Security Vendors and Their Technology: Working Better, Together

Business can be cutthroat, but when a company’s products are enlisted in the war against cyber-threats, it’s a battle that requires allied forces. Drew Amorosi talks to one security professional who underscores why cooperation and integration are increasingly becoming the norm among the security vendor community
01 July 2014

Comment: Ethical Compromises in the Name of National Security Comment: Ethical Compromises in the Name of National Security

Support for secret systems of indiscriminate surveillance is incompatible with the ethical codes of the information security profession, as Geordie Stewart observes
26 June 2014

The Perfect Target The Perfect Target

As the extraordinary Target breach narrative continues to unravel, Drew Amorosi investigates exactly who and what is to blame
03 June 2014

Interview: Rik Ferguson Interview: Rik Ferguson

At this winter's RSA Conference in San Francisco, Eleanor Dallaway interviewed an information security researcher, a rock star, a father of three, a graduate of French, and a man whose lifetime ambition is to sell pottery in the Dordogne. Of course, these all describe one person. Infosecurity presents Rik Ferguson…
14 May 2014

BYOD: A Victim of its Own Success BYOD: A Victim of its Own Success

Stephen Pritchard discovers the problems businesses face around BYOD, or bring your own device, are largely problems of success
24 April 2014

Cloud Security: A Crowded Standards Landscape? Cloud Security: A Crowded Standards Landscape?

Lacking a singular gold standard, the cloud security expanse can seem messy at times. But as Davey Winder discovers, it’s actually a form of controlled chaos
10 April 2014

Comment: Third Parties and Identity Management – Welcome to the World of Marketing Comment: Third Parties and Identity Management – Welcome to the World of Marketing

Marketing teams have many options for managing their activities around social media, website administration and analytics. David Meyer of OneLogin contemplates whether company security policies are being followed and how IT can get involved in managing risks
03 April 2014

Showing 1 - 10 of 177 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×