Infosecurity Blogs

  1. A Mission, Computers and Puzzles - What Could Be Better?

    We can’t start educating kids soon enough – a message that seems to be resonating beyond the walls of (ISC)² into the Halls of Congress, the academic community and corporate America.

  2. The Titan Pain of Dim Sum

    With the changing face of war, allowing other countries to operate potential attack facilities in one's own country is a major risk.

    1. Photo of John  Walker

      John Walker

      Visiting Professor at the School of Science & Technology - Nottingham Trent University

  3. Sound and Vision As Infosecurity Makes It Big On the Small Screen

    New cyber-crime drams breaks the fourth wall, dragging security out of its techie niche and into living rooms and most importantly boardrooms

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  4. Money’s Too Tight to Mention: Not for Infosecurity

    2015 will go down as the year when the security industry showed that the investment community was more than willing to put its money where its mouth was.

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  5. Sheep vs Cyber-Insurance

    Cyber-insurance can offer an additional level of protection to your organisation but can it give the desired level of protection?

    1. Photo of John  Walker

      John Walker

      Visiting Professor at the School of Science & Technology - Nottingham Trent University

  6. Infosecurity: Zip Up and Lose the Fear

    How are professionals implementing security architectures? How is how peopple working affecting efficacy of these systems?

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  7. Visual Hacking: The Eyes Have It

    Strangers on a train, shoulder surfing, and laptop privacy filters.

    1. Photo of David Harley

      David Harley

      Retired Cybersecurity Expert

  8. Your Not-So-Typical Cybersecurity Awareness Tips

    For those of us in the cybersecurity profession, the term “awareness” should not stop at educating users. As leaders in our field, the term must invoke a determination to address a workforce in crisis.

  9. Experian: It’s Our Data So We Must Demand MORE

    The Experian breach shows how our data and our lives are exposed to hackers, cyber criminals, state sponsored activities, and even authorized agencies.

    1. Photo of John  Walker

      John Walker

      Visiting Professor at the School of Science & Technology - Nottingham Trent University

  10. The Public Sector and Visual Privacy

    The public sector is arguably one of the market sectors that most closely appreciates the need for visual privacy as part of overall security strategies and is acting accordingly.

  11. The Rise of the Mobile Worker Increases the Risk of Visual Hacking

    The rise in mobile working and the ability to view other people’s screens is potentially a criminal’s dream. There’s no need for computer hacking expertise; instead, discreetly point a smartphone at a screen and click away or simply memorize what can be seen

  12. Only Consultant Surgeons Need Apply

    When it comes to securing the enterprise, your firm may pay close attention to obvious infrastructure security assets along with delivering against governance and compliance regimes. Yet it may be that your organisation can be both insecure and compliant at the same time

    1. Photo of John  Walker

      John Walker

      Visiting Professor at the School of Science & Technology - Nottingham Trent University

  13. Why Security Professionals Need to Start Prioritizing Visual Privacy

    The visual hacking threat and ways to address it.

  14. Visual Hacking Exposed – Results of the 3M Visual Hacking Experiment

    The results of a ground-breaking study carried out by the Ponemon Institute, in association with 3M, for the first time puts some context around the very real ‘visual hacking’ risk

  15. Isn’t It Time to Prioritize Visual Security?

    As we all start to work more in open plan areas, or carry out work on trains, planes or in coffee shops, the opportunities for ‘visual hacking’ increase.

  16. Defense Support to Commercial Nation State Intrusions

    With immense capacity and advanced technical capabilities, the military is well prepped to support the commercial sector handling complex nation state intrusions

    1. Photo of Robert S. Johnston

      Robert S. Johnston

      Captain, USMC & Team Lead, 81 National Cyber Protection Team

  17. Spelling Bee (Input from the Hive Mind)

    For a researcher, curiosity is usually an advantage: in fact, it’s probably a survival characteristic. However, it’s sometimes a curse

    1. Photo of David Harley

      David Harley

      Retired Cybersecurity Expert

  18. Keeping It Classy When It Comes To Data Security

    The subject of classifying data has been propelled into the public domain out of the acts of one lady candidate who is running for office in the US - and I believe her actions open up a much wider debate on the techy subject of classifying data.

    1. Photo of John  Walker

      John Walker

      Visiting Professor at the School of Science & Technology - Nottingham Trent University

  19. The Fly in Google’s Alphabet Soup

    Good alphabet soup, like a Scrabble board, has 26 letters just like the English alphabet. We use them to form words, sentences, thoughts, and ideas. But Google’s Alphabet is a murkier recipe – it is a parent holding company – for a behemoth data collection endeavor

    1. Photo of Mark Weinstein

      Mark Weinstein

      CEO, MeWe.com

  20. Five Challenges Facing Security Startups

    Not every security startup makes its founders multi-millionaires. For every billion-dollar success story, thousands of companies will develop security products you will never hear about, let alone buy

    1. Photo of Rob Sloan

      Rob Sloan

      Head of Cyber Content and Data, Dow Jones

What’s Hot on Infosecurity Magazine?