Features

Identity and Access Management

CISO Then (2003) and CISO Now (2013) CISO Then (2003) and CISO Now (2013)

The evolutionary speed of technology can be rivaled by few things. The role of the CISO might give it some competition though, concludes Todd Fitzgerald of (ISC)²
23 December 2013

Comment: Empower your Consumer to Earn their Trust Comment: Empower your Consumer to Earn their Trust

Being transparent with consumers and giving them control over their data makes good business sense. Unfortunately there is no one-stop solution. In this article Patrick Nielsen of Evidon looks at the compliance and security challenges of online and mobile advertising, arguing that empowering the consumer is key to commercial success
19 December 2013

Information Security: The Next Ten Years Information Security: The Next Ten Years

The information security industry is going to spend the next ten years solving the problems of the last twenty, finds Danny Bradbury
10 December 2013

Marking the Milestones: 10 Years of Infosecurity Magazine Marking the Milestones: 10 Years of Infosecurity Magazine

From Blaster to Edward Snowden, Drew Amorosi looks back at 10 years of Infosecurity magazine and the profession it serves
27 November 2013

Comment: Big Data Is the Security Professional’s New Best Friend Comment: Big Data Is the Security Professional’s New Best Friend

Mark Seward of Splunk discusses the changing enterprise security landscape and the role machine data plays in identifying threats and providing greater visibility into system security
26 November 2013

Interview: Peter Denning Interview: Peter Denning

When Egypt’s great library in Alexandria was destroyed, with it went centuries of scientific and cultural knowledge. In much the same fashion, as the PC era dawned, lost were the fundamental security principles accumulated by computing’s innovators. Drew Amorosi recaps his history lesson as provided by Peter Denning
21 November 2013

Comment: Today’s Biggest Security Risk – Your CEO Comment: Today’s Biggest Security Risk – Your CEO

Company leadership who underestimate the risks posed to data are standing in the way of stronger, more efficient security, says Clement Cazalot of docTrackr
05 November 2013

Meeting the IT Security Challenge Meeting the IT Security Challenge

How do you secure a business network? Experts debate whether to focus on keeping devices free of malware or to find ways to protect data despite infected devices
04 November 2013

Lay Your Chips Down: An Infosec Venture Capital Roundup Lay Your Chips Down: An Infosec Venture Capital Roundup

Is the information security industry a wise gamble for venture capitalists? Stephen Pritchard gets the insider’s view on what investors are looking for
21 October 2013

India’s Cybersecurity Challenge India’s Cybersecurity Challenge

India has a big job on its hands as it tries to drive a culture of cybersecurity through a country of 1.2 billion people. Danny Bradbury reports on its progress
17 September 2013

Showing 11 - 20 of 169 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×