Infosecurity Blogs

The Role of CISO in the Face of the GDPR

The Role of CISO in the Face of the GDPR

GDPR will create a lot of work in a short time, and the CISO will need help from the whole corporation.

Security: A High-Stake Soccer Match

Security: A High-Stake Soccer Match

If we delve into IT security, we discover it has more in common with soccer than would have been initially expected

Brought to you by
Comarch

For Phishing Protection, Rely on More than Users

For Phishing Protection, Rely on More than Users

If we are “down to people” to protect against phishing and ransomware, as is claimed by many security professionals in addition to Wombat, we should just give up the fight.

CISO and CIO Strategic and Together, or Nothing

CISO and CIO Strategic and Together, or Nothing

In a simplified holistic view, what we saw and continue to see today is an exponential movement of technology adoption

Adopting Performance Data into Your Security Strategy

Adopting Performance Data into Your Security Strategy

It is essential that data centres use standard performance metrics as the basis of a comprehensive security policy and process.

A Culture of Security, Not of Blame

A Culture of Security, Not of Blame

Technology continuously introduces huge amounts of security challenges and risk factors, which we keep blaming employees for not handling correctly. Blaming people for not handling poor technology correctly is - in my opinion - simply wrong.

Why You Need Private Browsing

Why You Need Private Browsing

If you thought browsing securely (and privately) was as easy as opening a new incognito window, think again.

EU GDPR Final Countdown: How to Prepare Your Security Program

EU GDPR Final Countdown: How to Prepare Your Security Program

GDPR will have real-world impact, and not just for EU member states.

Is DDoS Protection Right For You?

Is DDoS Protection Right For You?

What should a company do about DDoS? They should follow a risk-based methodology to judge cost and weigh it against benefits and ways to address the risk.

Key Details on the Australian Meta-Data Retention Law

Key Details on the Australian Meta-Data Retention Law

As Australia's newly approved Data Retention law comes into effect, how does it actually affect the average internet user?

How To Sell Endpoint Security to Business Leaders

How To Sell Endpoint Security to Business Leaders

Engaging with C-suite execs, security pros can more effectively explain and advocate the need to invest while leading the business toward a safer future.

Why Bill 34 is Bad News for Internet Privacy

Why Bill 34 is Bad News for Internet Privacy

The S.J.Res. 34 bill has effectively destroyed the privacy of internet users in the US and has taken the world by storm.

What’s Hot on Infosecurity Magazine?