Features

Public Sector

Comment: Ethical Compromises in the Name of National Security Comment: Ethical Compromises in the Name of National Security

Support for secret systems of indiscriminate surveillance is incompatible with the ethical codes of the information security profession, as Geordie Stewart observes
26 June 2014

The Internet of Things: The Good, The Bad, And Everything In Between The Internet of Things: The Good, The Bad, And Everything In Between

Theoretical physicist Michio Kaku predicts that computers, in the future, “will be everywhere and nowhere”. Join Wendy M. Grossman as she explores this Internet of Things to come
23 June 2014

Members' Content

Life after Snowden Life after Snowden

What will life on the internet look like, now that the cat is out of the bag? Danny Bradbury reports from the edge of a worrying new frontier
10 June 2014

Members' Content

Cyber-espionage is the “New Normal”: One on One with Mandiant’s Kevin Mandia Cyber-espionage is the “New Normal”: One on One with Mandiant’s Kevin Mandia

Mandiant’s chief executive and founder says that responding to data breaches is the best, most exciting job in all of IT security, and that you can blame China for supporting cyber-espionage when evidence supports the claim
22 May 2014

Interview: Rik Ferguson Interview: Rik Ferguson

At this winter's RSA Conference in San Francisco, Eleanor Dallaway interviewed an information security researcher, a rock star, a father of three, a graduate of French, and a man whose lifetime ambition is to sell pottery in the Dordogne. Of course, these all describe one person. Infosecurity presents Rik Ferguson…
14 May 2014

Comment: Mitigate Cyber Attacks Now in Emerging Markets Comment: Mitigate Cyber Attacks Now in Emerging Markets

As the use of mobile technology continues to rise in emerging markets, there is a growing concern around the compromise of privacy and data security. GlobalLogic’s Juan Manuel Caracoche and Tzvi Kasten explain the state of security in Brazil and other emerging countries and why building security protection into products will mitigate phishing and malware attacks
13 May 2014

2013: The Year Hacktivism Fell? 2013: The Year Hacktivism Fell?

At the close of 2012, McAfee claimed attacks by Anonymous would slow in 2013, and it appears the security firm’s prophecy was realized. Tom Brewster looks at the state of hacktivism after a turbulent year, finding it has become something different and possibly far more positive
28 April 2014

Preparing for Europe's General Data Protection Regulation Preparing for Europe's General Data Protection Regulation

Will it come, or will it go? Kevin Townsend discusses major roadblocks to the EU’s proposed data protection legislation, and how organizations can prepare
15 April 2014

Cloud Security: A Crowded Standards Landscape? Cloud Security: A Crowded Standards Landscape?

Lacking a singular gold standard, the cloud security expanse can seem messy at times. But as Davey Winder discovers, it’s actually a form of controlled chaos
10 April 2014

Government Surveillance: With the Damage Comes Promise Government Surveillance: With the Damage Comes Promise

On the heels of his recent keynote at the RSA Conference in San Francisco, Scott Charney, corporate VP of Microsoft’s Trustworthy Computing Group, sat down with our Drew Amorosi to talk about the reputational damage inflicted by NSA surveillance disclosures, and what the industry must do to respond
14 March 2014

Showing 1 - 10 of 157 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×