Features

Identity and Access Management

Government's Role in Information Security: Leave it to the Experts Government's Role in Information Security: Leave it to the Experts

Daniel R Walsh says those already tasked with protecting our information society are in the best position to create and implement any standards
24 October 2012

Comment: May the (En)Force(ment) Be With You – Security Lessons from Star Wars Comment: May the (En)Force(ment) Be With You – Security Lessons from Star Wars

From applying security policies to DLP and effective user authentication, there are many infosecurity lessons to be learned from the classic space opera. Terry Greer-King of Check Point shows how companies can avoid the Empire’s mistakes
19 October 2012

Interview: Paul Judge of Barracuda Networks Interview: Paul Judge of Barracuda Networks

Paul Judge is a contradiction. Juxtaposing the words geek and cool, and the words laid-back and workaholic, seemingly creates an unlikely, inaccurate personality, but having spent a decent amount of time with Mr Judge, Eleanor Dallaway is confident and committed to these adjectives
15 October 2012

The Cloud Gives, Takes Away, and Gives Back Again The Cloud Gives, Takes Away, and Gives Back Again

How far would someone go to take over another person’s Twitter account? Drew Amorosi finds out that in the case of Mat Honan, senior writer for Wired, it appears to be great lengths
08 October 2012

Comment: Enterprise Log Managers – An Unsexy, But Vital Tool Comment: Enterprise Log Managers – An Unsexy, But Vital Tool

Representatives from ISACA and CA Technologies look at why enterprise log managers are an essential element of IT security that can also provide value through non-IT security use cases
21 September 2012

Hard, Soft, or Smart? Evaluating the Two-Factor Authentication Options Hard, Soft, or Smart? Evaluating the Two-Factor Authentication Options

Engineer and researcher Grant Le Brun evaluates the current landscape for two-factor authentication
20 September 2012

The Potential Weaknesses in a Virtualized Infrastructure The Potential Weaknesses in a Virtualized Infrastructure

IEEE’s Kevin Curran examines the weak points of virtualized infrastructures and the solutions everyone should consider
13 September 2012

Comment: The Death of the CISO? Comment: The Death of the CISO?

At a significant crossroads, the infosec profession must adapt to avoid failure says Mark Brown of Ernst & Young
10 September 2012

Should You Give Biometrics a Break? Should You Give Biometrics a Break?

Biometric identification has been around for more than 100 years. Davey Winder investigates its relevance and feasibility for the IT security world today
07 September 2012

Token Debate: Worthless, Worthless Token Debate: Worthless, Worthless

This sums up the opinion of ISACA’s Richard Hollis when it comes to the value of token-based authentication
30 August 2012

Showing 71 - 80 of 177 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×