Infosecurity Magazine Features
Connected Vehicles: the Next Big Security Challenge?
With the concept of the connected car invading our lives at what often seems like unprecedented speed, ensuring they are made secure at the manufacturing stage is emerging as one of the next big cybersecurity skills challenges. Michael Hill reports
Hackers Have Evolved into Sophisticated, Organized Criminals
If there’s one thing the last few years have shown us it’s that hackers have evolved into sophisticated, organized criminals, capable of orchestrating well-oiled, imaginative attacks
Will the GDPR help the CISO?
The General Data Protection Regulation will be the biggest shake up of data protection measures in almost 20 years, so what does it mean for your average security type? Dan Raywood talked to Quentyn Taylor for his two year predictions.
Mobile Payments, How Secure?
Mobile payments have taken off, with Apple Pay and contactless cards now widely accepted, but how can retailers be sure these payments are secure and can’t be counterfeited or intercepted?
Mr Retail Security
Sitting in the central London office of UK high street powerhouse M&S, head of information security Lee Barney talked to me about the changes he has overseen since he took the job in 2015.
Retail Security - Lessons Learned Two Years On
Two years on from these headlines, the focus of attackers appears to have switched away from retailers to the healthcare sector, where the lucrative bounty of personally identifiable information is available.
The Cybercrime Corporation
With estimates that hackers who steal just 50 credit card numbers can make up to $1 million, there is little doubt that cybercrime pays. However, cybercrime is not just big business when it comes to revenue lines. Over the last five years we have seen this underground economy reshape itself into a sophisticated enterprise, adopting the same hierarchy, sales models and marketing practices as legal businesses.
GDPR – Good for the DPO
The long awaited reform of the European data protection laws will be implemented in 2018. Dan Raywood talked to Tim Turner and Jon Baines from the National Association of Data Protection Officers (NADPO) about how changes are affecting those doing the job.
Backdoors in Technology - is Privacy and Investigation Possible?
In the recent legal case between Apple and the Federal Bureau of Investigation, the FBI wanted to force Apple to provide a security bypass to allow access to a dead gunman’s iPhone. Encrypted devices have been a bugbear of law enforcement agencies for some time and FBI Director James Comey has been vocal about the damage being done to investigations stating: “I don’t know why we would want to put people beyond the law.”
How Safe Behind the Privacy Shield?
The October 2015 European Court of Justice (CJEU) decision invalidating Safe Harbor, the workaround agreement under which companies were allowed to transfer EU citizens' personal data to the US, which lacks comparable data protection laws, opened the way for months of uncertainty.
Would Like to Meet
San Francisco resident Chris Orris uses an electronic dating service called ‘Coffee Meets Bagel’ (CMB). The site, which draws on users’ Facebook information to recommend potential mates, enjoys a positive reputation. In 2014, CMB made Time Magazine’s top ten list of apps for people who want to fall in love.
Brexit - Goodbye EU, Hello Cyber Chaos?
Between Westminster posturing and political expediency, shameless scaremongering and unseemingly jingoism, the debate over whether a ‘Brexit’ could affect the UK’s cybersecurity industry has largely been ignored by those who should know better. A poll by Tech London Advocates of its 3,000 senior members in March found a resounding 80%+ want to stay in the EU, but there are some who remain undecided or actively hostile to the status quo.