Infosecurity Magazine Features

Mobile Payments, How Secure?

Mobile Payments, How Secure?

Mobile payments have taken off, with Apple Pay and contactless cards now widely accepted, but how can retailers be sure these payments are secure and can’t be counterfeited or intercepted?

Mr Retail Security

Mr Retail Security

Sitting in the central London office of UK high street powerhouse M&S, head of information security Lee Barney talked to me about the changes he has overseen since he took the job in 2015.

Retail Security - Lessons Learned Two Years On

Retail Security - Lessons Learned Two Years On

Two years on from these headlines, the focus of attackers appears to have switched away from retailers to the healthcare sector, where the lucrative bounty of personally identifiable information is available.

The Cybercrime Corporation

The Cybercrime Corporation

With estimates that hackers who steal just 50 credit card numbers can make up to $1 million, there is little doubt that cybercrime pays. However, cybercrime is not just big business when it comes to revenue lines. Over the last five years we have seen this underground economy reshape itself into a sophisticated enterprise, adopting the same hierarchy, sales models and marketing practices as legal businesses.

GDPR – Good for the DPO

GDPR – Good for the DPO

The long awaited reform of the European data protection laws will be implemented in 2018. Dan Raywood talked to Tim Turner and Jon Baines from the National Association of Data Protection Officers (NADPO) about how changes are affecting those doing the job.

Backdoors in Technology - is Privacy and Investigation Possible?

Backdoors in Technology - is Privacy and Investigation Possible?

In the recent legal case between Apple and the Federal Bureau of Investigation, the FBI wanted to force Apple to provide a security bypass to allow access to a dead gunman’s iPhone. Encrypted devices have been a bugbear of law enforcement agencies for some time and FBI Director James Comey has been vocal about the damage being done to investigations stating: “I don’t know why we would want to put people beyond the law.”

How Safe Behind the Privacy Shield?

How Safe Behind the Privacy Shield?

The October 2015 European Court of Justice (CJEU) decision invalidating Safe Harbor, the workaround agreement under which companies were allowed to transfer EU citizens' personal data to the US, which lacks comparable data protection laws, opened the way for months of uncertainty.

Would Like to Meet

Would Like to Meet

San Francisco resident Chris Orris uses an electronic dating service called ‘Coffee Meets Bagel’ (CMB). The site, which draws on users’ Facebook information to recommend potential mates, enjoys a positive reputation. In 2014, CMB made Time Magazine’s top ten list of apps for people who want to fall in love.

Brexit - Goodbye EU, Hello Cyber Chaos?

Brexit - Goodbye EU, Hello Cyber Chaos?

Between Westminster posturing and political expediency, shameless scaremongering and unseemingly jingoism, the debate over whether a ‘Brexit’ could affect the UK’s cybersecurity industry has largely been ignored by those who should know better. A poll by Tech London Advocates of its 3,000 senior members in March found a resounding 80%+ want to stay in the EU, but there are some who remain undecided or actively hostile to the status quo.

Taking the Offensive – Disrupting Cybercrime

Taking the Offensive – Disrupting Cybercrime

As the threat of cyber-attacks grows, businesses are struggling to keep pace with the constantly evolving tactics of cyber-criminals, hacktivists, state sponsored attacks and even cyber-terrorists.

NAC Passes the Crown – to NAC

NAC Passes the Crown – to NAC

In the past, NAC was first and foremost meant to address otherwise cumbersome ways of managing network connections.

CyberCenturion 2016 Winners Crowned at Bletchley Park Final

CyberCenturion 2016 Winners Crowned at Bletchley Park Final

In April this year, the historic venue of The National Museum of Computing (TNMOC) played host to the national finals of CyberCenturion 2016, a country-wide cybersecurity contest aimed at discovering and developing the cyber skills of youngsters in the UK. It was a school team from Gibraltar who eventually took the spoils after a day of fast-paced cyber competition at Bletchley Park, sponsored by Cyber Security Challenge UK and global security company Northrop Grumman.

What’s Hot on Infosecurity Magazine?