Infosecurity Blogs

  1. Containing the application security problem

    Containerisation is proving to be a popular and effective way of deploying apps, especially in a DevOps environment. This poses new security challenges, but also new security solutions.

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  2. The IOT’s Journey from the Spy in the Cab to the Flat (Cow) Field

    Are IOT use cases totally at mercy of legislatures whose decisions, could be as far reaching as they are unpredictable?

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  3. Better Late Than Never

    Even in this era of embracing technology, there is still a vast void between understanding the technology, and recognizing the implied significance imposed on any scene-of-crime.

    1. Photo of John  Walker

      John Walker

      Visiting Professor at the School of Science & Technology - Nottingham Trent University

  4. A Synchronized Approach to Network and Endpoint Threat Intel

    A synchronized security protection approach that takes a fresh view of how threat intel can be used

    1. Photo of Tara Seals

      Tara Seals

      US/North America News Reporter, Infosecurity Magazine

  5. Terror Warning Messages Spread Malware

    The efforts target United Arab Emirates-based companies and employees, as well as Bahrain, Turkey and, more recently, Canada.

    1. Photo of Tara Seals

      Tara Seals

      US/North America News Reporter, Infosecurity Magazine

  6. Why the Legal Profession Needs to Think About Visual Privacy

    Increased focus on visual privacy is taking place across the board, but particularly in some professions, of which legal is a good example.

  7. Protection—From Inside Out

    Defending against hacks is very much a case of looking to both the inside and outside of organizations.

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  8. Don’t Get Bitten: The Story of the Social RAT-in-the-Browser

    The next generation of Remote Access Trojans could make fraudsters more eager than ever to find new solutions that help penetrate user networks quickly and easily

    1. Photo of Oren Kedem

      Oren Kedem

      Vice President of Product Management, BioCatch

  9. Individual Privacy: The Latest Victim of Anonymous Hacks?

    Although Anonymous has galvanized a cult-like following into the age of 21st century civil disobedience, the internet has long been known to house a dungeon of unsupported information, and anonymity has occasionally added fuel to the fire.

    1. Photo of Jean-Loup Richet

      Jean-Loup Richet

      Research Fellow, ESSEC ISIS

  10. They Also Serve, Those That Keep Things Ticking Over

    Nice to haves in business are very much a thing of the past. But what about those items that are essential whose immediate value is not readily apparent.

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  11. Countering the Terrorism Cyber-Threat

    With cyber terrorism in the spotlight, how are cyber-tactics being used as a means to aid and conduct terrorist activities and what is the distinction between use of the internet and offensive cyber-techniques?

    1. Photo of Tom Williams

      Tom Williams

      Head of Operations, Context Information Security

  12. Hacking Without Computers

    As organisations improve their network perimeter security, the human factor often presents the weakest link to protect information and assets.

    1. Photo of Owen  Wright

      Owen Wright

      Managing Director at Context, part of Accenture

  13. The Risk of ‘Visual Hacking’ in the Financial Services Industry

    As well as software-based systems, financial organisations are increasingly looking at the emerging threat vector of ‘visual hacking’, which is the risk around people being able to obtain information simply by glancing at a screen.

  14. A Day in the Life of an IT Pro: Bridging the Islands on the Company Continent

    In many companies, the business leadership team, the applications team and the infrastructure team are all different entities that can feel worlds apart. And their organizational goals and alignment can vary massively.

    1. Photo of Kent Row

      Kent Row

      IT Admin, AKA Super Hero, SolarWinds

  15. Happy Halloween - Putting the Genie Back Into the Bottle

    Those who maintain the required level of vigilance over the creep of technology may have either taken their eye of the ball for some considerable time

    1. Photo of John  Walker

      John Walker

      Visiting Professor at the School of Science & Technology - Nottingham Trent University

  16. Turn another Page on the Teenage Rampage

    Should we be reassessing what is indeed normal teenage behavior when it seems that breaking security systems seems to now pass for the norm

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  17. Ponemon Institute study demonstrates the impact of visual hacking

    Visual hacking is explained and demonstrated, while possible solutions to the problem are presented.

  18. #TalkTalk: No White Flags, But Now Dido Needs to Act

    Can it really be that all it took to take-down a top telco was a techie teen?

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  19. How to Fix the Internet of Broken Things

    One answer to security problems with the Internet of Things may be to change from the closed source approach with software to an open source and open security approach.

    1. Photo of Art  Swift

      Art Swift

      President, prpl Foundation

  20. The Security Challenges Threatening to Tear the Internet of Things Apart

    The Internet of Things has the power to transform our lives, but it’s also developing at such a rate that it threatens to outstrip our ability to adequately secure it.

    1. Photo of Art  Swift

      Art Swift

      President, prpl Foundation

What’s Hot on Infosecurity Magazine?