Features

Public Sector

Preparing for Europe's General Data Protection Regulation Preparing for Europe's General Data Protection Regulation

Will it come, or will it go? Kevin Townsend discusses major roadblocks to the EU’s proposed data protection legislation, and how organizations can prepare
15 April 2014

Members' Content

Cloud Security: A Crowded Standards Landscape? Cloud Security: A Crowded Standards Landscape?

Lacking a singular gold standard, the cloud security expanse can seem messy at times. But as Davey Winder discovers, it’s actually a form of controlled chaos
10 April 2014

Members' Content

Government Surveillance: With the Damage Comes Promise Government Surveillance: With the Damage Comes Promise

On the heels of his recent keynote at the RSA Conference in San Francisco, Scott Charney, corporate VP of Microsoft’s Trustworthy Computing Group, sat down with our Drew Amorosi to talk about the reputational damage inflicted by NSA surveillance disclosures, and what the industry must do to respond
14 March 2014

Interview: Brian Honan Interview: Brian Honan

Brian Honan is a man who wears many hats, but all of them are white. Eleanor Dallaway travels to Dublin to spend an afternoon with one of the information security industry’s favorite treasures
11 March 2014

Hacker Training 101 Hacker Training 101

How do White Hats and Black Hats learn their trade? And are pen testing tools like Metasploit more useful for attackers or defenders? Drew Amorosi attends a master hacking class to find out…
25 February 2014

Comment: Cybersecurity Lessons from the Financial Sector Comment: Cybersecurity Lessons from the Financial Sector

Creating a cybersecurity policy is hard, largely because it’s so difficult to define success. A national cybersecurity initiative should define the goals we want to achieve and provide incentives for the private and public sector to cooperate. According to Matthew Cohen of NT OBJECTives, once that is done, the private sector can do what it does best: compete to provide the most robust and cost-effective solutions to the problem
09 January 2014

The Hack Back Controversy The Hack Back Controversy

An increasing amount of lip service is being paid to ‘hack back’ initiatives. While rules and levels of acceptance vary according to hack back entity – military, law enforcement and private industry – Kevin Townsend finds that perhaps the largest variance of opinion comes down to geography as he asks the question: Should hack back be a legal right for those under cyber-attack?
06 January 2014

Through Dark Clouds, a Ray of Light Through Dark Clouds, a Ray of Light

Increasingly complex threats lead Raj Samani to conclude that the state of data security is worse off than it was a decade ago – but not all is lost, as he explains
23 December 2013

Evolution of the Cybersecurity Professional Evolution of the Cybersecurity Professional

Hord Tipton pays tribute to the data security victories over the last 10 years, but acknowledges it’s a never-ending struggle replete with immense challenges
23 December 2013

CISO Then (2003) and CISO Now (2013) CISO Then (2003) and CISO Now (2013)

The evolutionary speed of technology can be rivaled by few things. The role of the CISO might give it some competition though, concludes Todd Fitzgerald of (ISC)²
23 December 2013

Showing 1 - 10 of 150 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×