Features

Malware and Hardware Security

Government's Role in Information Security: Involvement = Global Priority Government's Role in Information Security: Involvement = Global Priority

Hord Tipton believes government has a significant role in developing and enforcing information security standards
24 October 2012

Government's Role in Information Security: Leave it to the Experts Government's Role in Information Security: Leave it to the Experts

Daniel R Walsh says those already tasked with protecting our information society are in the best position to create and implement any standards
24 October 2012

Comment: May the (En)Force(ment) Be With You – Security Lessons from Star Wars Comment: May the (En)Force(ment) Be With You – Security Lessons from Star Wars

From applying security policies to DLP and effective user authentication, there are many infosecurity lessons to be learned from the classic space opera. Terry Greer-King of Check Point shows how companies can avoid the Empire’s mistakes
19 October 2012

Interview: Paul Judge of Barracuda Networks Interview: Paul Judge of Barracuda Networks

Paul Judge is a contradiction. Juxtaposing the words geek and cool, and the words laid-back and workaholic, seemingly creates an unlikely, inaccurate personality, but having spent a decent amount of time with Mr Judge, Eleanor Dallaway is confident and committed to these adjectives
15 October 2012

Comprehensive Cybersecurity: Securing the Human Operating System Comprehensive Cybersecurity: Securing the Human Operating System

In honor of National Cybersecuirty Awareness month in the US, Eric Cole of the SANS Institute highlights the role of people in any comprehensive security program
04 October 2012

SCADA Security Inertia SCADA Security Inertia

It’s no secret that SCADA systems are vulnerable to compromise, and the tools to mitigate many of the vulnerabilities are within reach. Yet, as Fred Donovan discovers, the vendors that supply these systems are often slow to react to the security issues
02 October 2012

The Potential Weaknesses in a Virtualized Infrastructure The Potential Weaknesses in a Virtualized Infrastructure

IEEE’s Kevin Curran examines the weak points of virtualized infrastructures and the solutions everyone should consider
13 September 2012

The Growing Movement in Social Responsibility The Growing Movement in Social Responsibility

Julie Peeler, director of the (ISC)² Foundation, examines how the IT security community is prioritizing its contribution to society
11 September 2012

Comment: The Death of the CISO? Comment: The Death of the CISO?

At a significant crossroads, the infosec profession must adapt to avoid failure says Mark Brown of Ernst & Young
10 September 2012

Should You Give Biometrics a Break? Should You Give Biometrics a Break?

Biometric identification has been around for more than 100 years. Davey Winder investigates its relevance and feasibility for the IT security world today
07 September 2012

Showing 101 - 110 of 247 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×