Infosecurity Magazine Features

Securing the Human to be Mightier than the Computer

Securing the Human to be Mightier than the Computer

People, not technology, are becoming the key to securing organizations today. For years organizations have invested in technology such as anti-virus, firewalls, full disk encryption or data loss prevention.

Securing Apps Critical to Advancing mHealth

Securing Apps Critical to Advancing mHealth

What started with a wave of fitness tracking tools has rapidly evolved into an active marketplace of smartphone apps and add-ons, networked personal health devices, Big Data analytics, and transformative healthcare delivery models.

Top 5 “Anti-Resolutions” to Fix Cyber-security in 2016

Top 5 “Anti-Resolutions” to Fix Cyber-security in 2016

To move forward in a healthier direction, I’ve identified five common approaches organizations should avoid for a more productive 2016.

Trust Who You Are Online With

Trust Who You Are Online With

The basic problem is that the internet was built, famously, without an identity layer. That is, its design includes no way for anyone to know with certainty what or which whom they are connecting.

Suffering Security Lag?

Suffering Security Lag?

The recent spate of security incidents provides timely evidence that our adoption of technology appears to be outstripping our ability to protect it.

DMARC Specification Poised to Take Webmail Woes by Storm in 2016

DMARC Specification Poised to Take Webmail Woes by Storm in 2016

The DMARC specification has been developed for web-based mail, which makes it virtually impossible for attackers to spoof, or fake, emails from a protected domain.

TalkTalk: the British Entry for Breach of the Year 2015

TalkTalk: the British Entry for Breach of the Year 2015

Everything’s always ‘bigger and better’ in the US, or at least that’s what they say. Unfortunately for federal employees and American consumers, this also means data breaches that have hit tens of millions over the past year.

Keeping Software Defined Data Centers Secure

Keeping Software Defined Data Centers Secure

Companies take all the aspects of an SDDC and think that everything has to be implemented at once.

Managing the Mobile Gap

Managing the Mobile Gap

"The frequency of updates is unparalleled. There have been 14 versions of iOS in the past year. And if you look at apps, every app update is a new app, every OS update is a new OS. And there are undocumented features with every update."

Cyber-Psychology: The Key to Securing the Human Element in Your Organization

Cyber-Psychology: The Key to Securing the Human Element in Your Organization

Cyber-psychology as a discipline is concerned with the interaction of the mind and behavior with various forms of information communication technology. Not only email, the internet and social media, but also virtual reality, gaming and smart devices.

Eyes on the Target

Eyes on the Target

The threat vector that we’re seeing are the same ones that you’re seeing frankly all over the news.

Cybersecurity and the next POTUS

Cybersecurity and the next POTUS

Security is always going to play a big part in any political race in America.

What’s Hot on Infosecurity Magazine?