Features

IT Forensics

Comment: Big Data Is the Security Professional’s New Best Friend Comment: Big Data Is the Security Professional’s New Best Friend

Mark Seward of Splunk discusses the changing enterprise security landscape and the role machine data plays in identifying threats and providing greater visibility into system security
26 November 2013

Interview: Peter Denning Interview: Peter Denning

When Egypt’s great library in Alexandria was destroyed, with it went centuries of scientific and cultural knowledge. In much the same fashion, as the PC era dawned, lost were the fundamental security principles accumulated by computing’s innovators. Drew Amorosi recaps his history lesson as provided by Peter Denning
21 November 2013

Comment: Chief Legal Officer will be a Powerful Ally to the CISO of the Future Comment: Chief Legal Officer will be a Powerful Ally to the CISO of the Future

Guidance Software’s Sam Maccherola outlines how the CLO can provide an added perspective as overall corporate risk manager, when it comes to putting together a water-tight cybersecurity incident response plan that will protect an organization’s legal interests
01 November 2013

Lay Your Chips Down: An Infosec Venture Capital Roundup Lay Your Chips Down: An Infosec Venture Capital Roundup

Is the information security industry a wise gamble for venture capitalists? Stephen Pritchard gets the insider’s view on what investors are looking for
21 October 2013

India’s Cybersecurity Challenge India’s Cybersecurity Challenge

India has a big job on its hands as it tries to drive a culture of cybersecurity through a country of 1.2 billion people. Danny Bradbury reports on its progress
17 September 2013

Hacking: Same Same but Different Hacking: Same Same but Different

In a world of increasingly rapid technology development, Kevin Townsend explains why – generally speaking – hacking techniques have evolved at a slower pace
10 September 2013

Comment: Cybercrime Goes Back to the Future Comment: Cybercrime Goes Back to the Future

Cybercrime goes back to its roots to infiltrate tomorrow’s organizations. Darren Turnbull of Fortinet looks at the importance of a unified approach and sandboxing as a key tactic in the fight against advanced persistent threats
05 September 2013

Comment: Data Retention – The Privacy Threat Hidden in Plain Sight Comment: Data Retention – The Privacy Threat Hidden in Plain Sight

The US may be reeling from revelations surrounding the NSA’s PRISM program but, as IVPN's Nick Pearson discusses, the next government program to threaten online privacy may originate from European shores
27 August 2013

Comment: Cybersecurity in a Post-prevention World Comment: Cybersecurity in a Post-prevention World

As long as we continue to incorrectly believe that we can simply block bad things, cybercriminals will win the battle, says Blue Coat’s Brian Contos. He suggests investing in incident detection and response to minimize the threat window following an incident, and to better understand what’s actually happened
21 August 2013

Cracking the Computer on Wheels Cracking the Computer on Wheels

Are the vehicles we drive the next target for hackers? Wendy M. Grossman steers us around the risks
20 August 2013

Showing 21 - 30 of 126 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×