Features

IT Forensics

Comment: Data Retention – The Privacy Threat Hidden in Plain Sight Comment: Data Retention – The Privacy Threat Hidden in Plain Sight

The US may be reeling from revelations surrounding the NSA’s PRISM program but, as IVPN's Nick Pearson discusses, the next government program to threaten online privacy may originate from European shores
27 August 2013

Comment: Cybersecurity in a Post-prevention World Comment: Cybersecurity in a Post-prevention World

As long as we continue to incorrectly believe that we can simply block bad things, cybercriminals will win the battle, says Blue Coat’s Brian Contos. He suggests investing in incident detection and response to minimize the threat window following an incident, and to better understand what’s actually happened
21 August 2013

Cracking the Computer on Wheels Cracking the Computer on Wheels

Are the vehicles we drive the next target for hackers? Wendy M. Grossman steers us around the risks
20 August 2013

Mutually Assured Cyber Destruction Mutually Assured Cyber Destruction

Jarno Limnell says without the unveiling of evidence that’s nearly impossible to collect, nation-states should take a look in the mirror before they blame China as the world’s worst transgressor of cyber-espionage
13 August 2013

Go Ahead, Blame China Go Ahead, Blame China

David Stupples contends China’s state-sponsored actors not only have the means, but also the motive to hack away at any organization’s intellectual property
13 August 2013

Do the Right Thing… For a Price: The Market for Vulnerability Data Do the Right Thing… For a Price: The Market for Vulnerability Data

The market for vulnerability data takes on three shades, depending on motive. As security researchers increasingly attempt to commoditize their findings, Davey Winder seeks to put a value on vulnerability information
31 July 2013

Interview: Microsoft's Scott Charney Interview: Microsoft's Scott Charney

Scott Charney tells Eleanor Dallaway why he is so proud to work for Microsoft, how he went from prosecutor to infosec professional, and why the role of US ‘cyber czar’ was not for him…
16 July 2013

A CEO's Guide to Big Data Security A CEO's Guide to Big Data Security

Feeling a bit lost in the Big Data ocean? The ISF’s Steve Durbin provides a life boat by briefing the Big Chair about its security and risk management implications
04 June 2013

Comment: Beware a Quiet Queen’s Speech Comment: Beware a Quiet Queen’s Speech

Consultant William Wallace finds that what wasn’t said in the recent speech to open the new session of parliament may be as interesting as what was.
28 May 2013

Arab Uprising: Information Security in the Middle East Arab Uprising: Information Security in the Middle East

The Middle East is an emerging market for information security and related awareness. With Israel already at the forefront of the industry, Wendy M. Grossman examines what the rest of the region is doing to catch up
28 May 2013

Showing 21 - 30 of 119 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×