Features

Security Training and Education

Review: The CISSP Companion You Can’t Do Without Review: The CISSP Companion You Can’t Do Without

Shan Lee finds there is much to learn from Javvad Malik’s humor in his new e-book "The CISSP Companion Handbook"
24 July 2014

Review: A Password System that Favors Puzzle Over Ease Review: A Password System that Favors Puzzle Over Ease

Bruce Marshall finds that one book offers up anything but an easy password creation system
15 July 2014

Bridging Information Security’s Enablement Gap Bridging Information Security’s Enablement Gap

Information security has emerged from its geeky, niche technical origins to become an integral part of overall organizational strategy. Wendy M. Grossman details how the industry’s professionals continue evolving as business enablers
15 July 2014

Members' Content

Comment: Size Doesn’t Matter in the Battle Against Cybercrime Comment: Size Doesn’t Matter in the Battle Against Cybercrime

Despite having enough resources and dedicated, generous budgets to invest in the latest security solutions, large companies often fail to adequately secure their networks. When it comes to cybersecurity, Fujitsu’s David Robinson argues, large organizations face similar obstacles as their smaller counterparts
07 July 2014

Interview: Rik Ferguson Interview: Rik Ferguson

At this winter's RSA Conference in San Francisco, Eleanor Dallaway interviewed an information security researcher, a rock star, a father of three, a graduate of French, and a man whose lifetime ambition is to sell pottery in the Dordogne. Of course, these all describe one person. Infosecurity presents Rik Ferguson…
14 May 2014

When Eleanor (Finally) Met Jack Daniel When Eleanor (Finally) Met Jack Daniel

I'd wanted to interview the great Jack Daniel for years, but until Infosecurity Europe 2014, the opportunity had never presented itself.
13 May 2014

Comment: Mitigate Cyber Attacks Now in Emerging Markets Comment: Mitigate Cyber Attacks Now in Emerging Markets

As the use of mobile technology continues to rise in emerging markets, there is a growing concern around the compromise of privacy and data security. GlobalLogic’s Juan Manuel Caracoche and Tzvi Kasten explain the state of security in Brazil and other emerging countries and why building security protection into products will mitigate phishing and malware attacks
13 May 2014

Q&A: Security Through Storytelling Q&A: Security Through Storytelling

The Analogies Project is a not-for-profit created to improve communications in information security. Founder, Bruce Hallas, tells Eleanor Dallaway why storytelling is key to Board buy-in
29 April 2014

Comment: Incident Response – Mitigate, Remediate and then Communicate Comment: Incident Response – Mitigate, Remediate and then Communicate

How do you handle an emergency incident, and communicate the details to management? By appointing a junior member of your team to handle this process, security analyst Bob Covello believes that incident response teams can increase their effectiveness
25 April 2014

Comment: Third Parties and Identity Management – Welcome to the World of Marketing Comment: Third Parties and Identity Management – Welcome to the World of Marketing

Marketing teams have many options for managing their activities around social media, website administration and analytics. David Meyer of OneLogin contemplates whether company security policies are being followed and how IT can get involved in managing risks
03 April 2014

Showing 1 - 10 of 156 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×