Features

Comment: New Approaches Needed for Database Security and Advanced Network Threats Comment: New Approaches Needed for Database Security and Advanced Network Threats

Today’s advanced threats require a smarter approach to database security that extends beyond detection and monitoring the usual attack surfaces and SQL injection techniques. This is the view from NetCitadel’s Duane Kuroda
17 April 2014

Preparing for Europe's General Data Protection Regulation Preparing for Europe's General Data Protection Regulation

Will it come, or will it go? Kevin Townsend discusses major roadblocks to the EU’s proposed data protection legislation, and how organizations can prepare
15 April 2014

Members' Content

Cloud Security: A Crowded Standards Landscape? Cloud Security: A Crowded Standards Landscape?

Lacking a singular gold standard, the cloud security expanse can seem messy at times. But as Davey Winder discovers, it’s actually a form of controlled chaos
10 April 2014

Members' Content

Tales of the Cyber Underground: LessPay, Cybercriminals’ Hot New Virtual Currency? Tales of the Cyber Underground: LessPay, Cybercriminals’ Hot New Virtual Currency?

Law enforcement agencies across the world are obsessed with virtual currencies, be it Bitcoin, Litecoin or Dogecoin. This was made apparent on a recent trip to Europol’s European Cyber Crime Centre (EC3) in The Hague.
08 April 2014

Windows XP’s Time Has Come…and Gone Windows XP’s Time Has Come…and Gone

With support for Windows XP set to run out as of tomorrow, April 8, Microsoft’s Tim Rains issues a last-minute warning on why users of the venerable operating system should upgrade now
07 April 2014

Comment: Third Parties and Identity Management – Welcome to the World of Marketing Comment: Third Parties and Identity Management – Welcome to the World of Marketing

Marketing teams have many options for managing their activities around social media, website administration and analytics. David Meyer of OneLogin contemplates whether company security policies are being followed and how IT can get involved in managing risks
03 April 2014

The Generation X, Y, Z of Information Security The Generation X, Y, Z of Information Security

Not all millennials approach privacy and security with the same attitudes. As Tom Brewster discovers, regardless of age, a one-sized-fits all approach to information security is not the solution
02 April 2014

Members' Content

Anti-Virus: Little More Than a Team Player Anti-Virus: Little More Than a Team Player

Anti-virus is just one small part of the holistic security strategy, argues Ryan W Smith
28 March 2014

Anti-virus Lives to Fight Another Day Anti-virus Lives to Fight Another Day

Anti-virus remains a cornerstone of any security strategy, finds David Harley, as he acknowledges the contributions of anti-malware researchers
28 March 2014

Infosecurity Interviews (ISC)2’s New MD EMEA, Adrian Davis Infosecurity Interviews (ISC)2’s New MD EMEA, Adrian Davis

Over lunch on the South Bank, Infosecurity Editor Eleanor Dallaway spoke to (ISC)2’s new MD EMEA, Adrian Davis, about his plans for ensuring that (ISC)2 EMEA is hot on the heels of its larger counterpart, (ISC)2 US…
27 March 2014

Showing 1 - 10 of 645 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×