Features

Identity and Access Management

The Generation X, Y, Z of Information Security The Generation X, Y, Z of Information Security

Not all millennials approach privacy and security with the same attitudes. As Tom Brewster discovers, regardless of age, a one-sized-fits all approach to information security is not the solution
02 April 2014

Comment: APT Detection – Closing the Gaping Hole Comment: APT Detection – Closing the Gaping Hole

Technology solutions to combat advanced persistent threats are in no short supply, but actually detecting these targeted infiltrations remains difficult. Avishai Ziv of LynuxWorks examines the reasons, and how to overcome the problem
24 March 2014

Interview: Brian Honan Interview: Brian Honan

Brian Honan is a man who wears many hats, but all of them are white. Eleanor Dallaway travels to Dublin to spend an afternoon with one of the information security industry’s favorite treasures
11 March 2014

Hacker Training 101 Hacker Training 101

How do White Hats and Black Hats learn their trade? And are pen testing tools like Metasploit more useful for attackers or defenders? Drew Amorosi attends a master hacking class to find out…
25 February 2014

Tackling the Authentication Problem Tackling the Authentication Problem

Why does authentication remain such a critical vulnerability for information security when there are so many regulatory initiatives and technical solutions attempting to address the problem? Davey Winder investigates the current state of play in the world of authentication
20 January 2014

A CEO’s Guide to Securing from Within A CEO’s Guide to Securing from Within

CyberArk’s Udi Mokady provides top tips on risk mitigation against internal and external threats for organizations
14 January 2014

Through Dark Clouds, a Ray of Light Through Dark Clouds, a Ray of Light

Increasingly complex threats lead Raj Samani to conclude that the state of data security is worse off than it was a decade ago – but not all is lost, as he explains
23 December 2013

Evolution of the Cybersecurity Professional Evolution of the Cybersecurity Professional

Hord Tipton pays tribute to the data security victories over the last 10 years, but acknowledges it’s a never-ending struggle replete with immense challenges
23 December 2013

CISO Then (2003) and CISO Now (2013) CISO Then (2003) and CISO Now (2013)

The evolutionary speed of technology can be rivaled by few things. The role of the CISO might give it some competition though, concludes Todd Fitzgerald of (ISC)²
23 December 2013

Comment: Empower your Consumer to Earn their Trust Comment: Empower your Consumer to Earn their Trust

Being transparent with consumers and giving them control over their data makes good business sense. Unfortunately there is no one-stop solution. In this article Patrick Nielsen of Evidon looks at the compliance and security challenges of online and mobile advertising, arguing that empowering the consumer is key to commercial success
19 December 2013

Showing 11 - 20 of 177 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×