Features

Wireless and Mobile Security

Tales of the Cyber Underground: Inside the Underground Ransomware Market Tales of the Cyber Underground: Inside the Underground Ransomware Market

With the volume of ransomware decreasing according to recent data, the quality appears to be increasing in tandem. Tom Brewster charts the evolution in the latest Tales of the Cyber Underground installment
23 July 2014

Q&A: Ken Pfeil, CISO, Pioneer Investments Q&A: Ken Pfeil, CISO, Pioneer Investments

Ken Pfeil of Pioneer Investments sat down with Infosecurity’s Drew Amorosi in Stamford, Connecticut, as the two covered a broad range of topics. Highlights include Windows XP end of life, vulnerability assessment, choosing the right technology, and how to evaluate potential technology vendors.
18 July 2014

Comment: New Leadership Amidst Microsoft’s Identity Crisis Comment: New Leadership Amidst Microsoft’s Identity Crisis

At a crossroads of generational shifts in computing and security threats, Vaultive’s Elad Yoran asks, can Microsoft adapt?
11 July 2014

Security Vendors and Their Technology: Working Better, Together Security Vendors and Their Technology: Working Better, Together

Business can be cutthroat, but when a company’s products are enlisted in the war against cyber-threats, it’s a battle that requires allied forces. Drew Amorosi talks to one security professional who underscores why cooperation and integration are increasingly becoming the norm among the security vendor community
01 July 2014

Comment: Ethical Compromises in the Name of National Security Comment: Ethical Compromises in the Name of National Security

Support for secret systems of indiscriminate surveillance is incompatible with the ethical codes of the information security profession, as Geordie Stewart observes
26 June 2014

The Internet of Things: The Good, The Bad, And Everything In Between The Internet of Things: The Good, The Bad, And Everything In Between

Theoretical physicist Michio Kaku predicts that computers, in the future, “will be everywhere and nowhere”. Join Wendy M. Grossman as she explores this Internet of Things to come
23 June 2014

Members' Content

Life after Snowden Life after Snowden

What will life on the internet look like, now that the cat is out of the bag? Danny Bradbury reports from the edge of a worrying new frontier
10 June 2014

Members' Content

Interview: Rik Ferguson Interview: Rik Ferguson

At this winter's RSA Conference in San Francisco, Eleanor Dallaway interviewed an information security researcher, a rock star, a father of three, a graduate of French, and a man whose lifetime ambition is to sell pottery in the Dordogne. Of course, these all describe one person. Infosecurity presents Rik Ferguson…
14 May 2014

Comment: Mitigate Cyber Attacks Now in Emerging Markets Comment: Mitigate Cyber Attacks Now in Emerging Markets

As the use of mobile technology continues to rise in emerging markets, there is a growing concern around the compromise of privacy and data security. GlobalLogic’s Juan Manuel Caracoche and Tzvi Kasten explain the state of security in Brazil and other emerging countries and why building security protection into products will mitigate phishing and malware attacks
13 May 2014

BYOD: A Victim of its Own Success BYOD: A Victim of its Own Success

Stephen Pritchard discovers the problems businesses face around BYOD, or bring your own device, are largely problems of success
24 April 2014

Showing 1 - 10 of 202 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×