Infosecurity Magazine Features

GDPR – Good for the DPO

GDPR – Good for the DPO

The long awaited reform of the European data protection laws will be implemented in 2018. Dan Raywood talked to Tim Turner and Jon Baines from the National Association of Data Protection Officers (NADPO) about how changes are affecting those doing the job.

Backdoors in Technology - is Privacy and Investigation Possible?

Backdoors in Technology - is Privacy and Investigation Possible?

In the recent legal case between Apple and the Federal Bureau of Investigation, the FBI wanted to force Apple to provide a security bypass to allow access to a dead gunman’s iPhone. Encrypted devices have been a bugbear of law enforcement agencies for some time and FBI Director James Comey has been vocal about the damage being done to investigations stating: “I don’t know why we would want to put people beyond the law.”

How Safe Behind the Privacy Shield?

How Safe Behind the Privacy Shield?

The October 2015 European Court of Justice (CJEU) decision invalidating Safe Harbor, the workaround agreement under which companies were allowed to transfer EU citizens' personal data to the US, which lacks comparable data protection laws, opened the way for months of uncertainty.

Would Like to Meet

Would Like to Meet

San Francisco resident Chris Orris uses an electronic dating service called ‘Coffee Meets Bagel’ (CMB). The site, which draws on users’ Facebook information to recommend potential mates, enjoys a positive reputation. In 2014, CMB made Time Magazine’s top ten list of apps for people who want to fall in love.

Brexit - Goodbye EU, Hello Cyber Chaos?

Brexit - Goodbye EU, Hello Cyber Chaos?

Between Westminster posturing and political expediency, shameless scaremongering and unseemingly jingoism, the debate over whether a ‘Brexit’ could affect the UK’s cybersecurity industry has largely been ignored by those who should know better. A poll by Tech London Advocates of its 3,000 senior members in March found a resounding 80%+ want to stay in the EU, but there are some who remain undecided or actively hostile to the status quo.

Taking the Offensive – Disrupting Cybercrime

Taking the Offensive – Disrupting Cybercrime

As the threat of cyber-attacks grows, businesses are struggling to keep pace with the constantly evolving tactics of cyber-criminals, hacktivists, state sponsored attacks and even cyber-terrorists.

NAC Passes the Crown – to NAC

NAC Passes the Crown – to NAC

In the past, NAC was first and foremost meant to address otherwise cumbersome ways of managing network connections.

CyberCenturion 2016 Winners Crowned at Bletchley Park Final

CyberCenturion 2016 Winners Crowned at Bletchley Park Final

In April this year, the historic venue of The National Museum of Computing (TNMOC) played host to the national finals of CyberCenturion 2016, a country-wide cybersecurity contest aimed at discovering and developing the cyber skills of youngsters in the UK. It was a school team from Gibraltar who eventually took the spoils after a day of fast-paced cyber competition at Bletchley Park, sponsored by Cyber Security Challenge UK and global security company Northrop Grumman.

Securing the Human to be Mightier than the Computer

Securing the Human to be Mightier than the Computer

People, not technology, are becoming the key to securing organizations today. For years organizations have invested in technology such as anti-virus, firewalls, full disk encryption or data loss prevention.

Securing Apps Critical to Advancing mHealth

Securing Apps Critical to Advancing mHealth

What started with a wave of fitness tracking tools has rapidly evolved into an active marketplace of smartphone apps and add-ons, networked personal health devices, Big Data analytics, and transformative healthcare delivery models.

Top 5 “Anti-Resolutions” to Fix Cyber-security in 2016

Top 5 “Anti-Resolutions” to Fix Cyber-security in 2016

To move forward in a healthier direction, I’ve identified five common approaches organizations should avoid for a more productive 2016.

Trust Who You Are Online With

Trust Who You Are Online With

The basic problem is that the internet was built, famously, without an identity layer. That is, its design includes no way for anyone to know with certainty what or which whom they are connecting.

What’s Hot on Infosecurity Magazine?