Infosecurity Blogs

  1. Five Challenges Facing Security Startups

    Not every security startup makes its founders multi-millionaires. For every billion-dollar success story, thousands of companies will develop security products you will never hear about, let alone buy

    1. Photo of Rob Sloan

      Rob Sloan

      Head of Cyber Content and Data, Dow Jones

  2. Cyber Threat Intelligence – No Longer Just a Nice To Have

    Information Leakage is possibly one of the most common, and misunderstood security risks faced today, and potentially one which impacts organizations every single day. When linked to electronic distance information gathering, it can, and does pose significant security risks to any business, or government agencies alike.

    1. Photo of John  Walker

      John Walker

      Visiting Professor at the School of Science & Technology - Nottingham Trent University

  3. Network Security: Securing the Ever-Expanding Boundary

    Organizations of all sizes need to ensure they are fully prepared to deal with ever-emerging challenges by equipping themselves to better deal with attacks on their business as well as their reputation

    1. Photo of Steve Durbin

      Steve Durbin

      CEO, Information Security Forum

  4. The rise of digital natives and their enthusiasm for cloud services

    As digital natives enter management positions and shadow IT deployments become an accepted norm, the choice is no longer whether or not to adopt cloud-based services, but about the security measures that are put in place to support their use.

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  5. Back in Black In Las Vegas

    Black Hat hacking automotive Las Vegas mobile Android Stagefright

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  6. Cybersecurity in the Modern Age – Get with the 2020 Program

    If we have come so far down the matured route toward infosecurity, just how have we arrived at the current situation?

    1. Photo of John  Walker

      John Walker

      Visiting Professor at the School of Science & Technology - Nottingham Trent University

  7. Confidence in Data Security Part 2 – Weak Links

    All organizations are dependent on information supply chains; these improve customer communications and business processes. However, to exploit information supply chains to the full requires confidence in data security

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  8. A Day in the Life of an IT Pro: The Unsuspected Inside Man

    The principles behind social media can be used to increase organizational security

    1. Photo of Kent Row

      Kent Row

      IT Admin, AKA Super Hero, SolarWinds

  9. Securing the Internet of Things – Time for Another Look at Public Key Infrastructure (PKI)?

    The increasing use of the Internet of Things (IoT) to support a wide range of business processes has huge potential value for businesses; however, it also opens up a new security front. Authenticating things every time they communicate helps mitigate the threat and this has led to renewed interest in Public Key Infrastructure (PKI)

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  10. Confidence in Data Security Part 1 – Room for Improvement

    Improving user knowledge, deploying advanced technology and co-ordinating incident response and policy all make a big difference in the level of confidence organisations have about data security

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  11. Data-First or Employee-First?

    One only has to look at the imbroglio that surrounds a breach like Target to see that we are in a new era

    1. Photo of Mike Hine

      Mike Hine

      Deputy Editor, Infosecurity Magazine

  12. Don't Worry About The Government: Quis Custodiet Ipsos Custodes

    The phrase ‘just because you’re paranoid doesn’t mean they’re not out to get you’ has become something of a hoary old cliché. But for UK MPs, the phrase has a very contemporary and relevant meaning

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  13. Closing the Net on Attackers

    It’s become a consistent adage in security that defense no longer stops at the perimeter. There is so much more to consider in a modern ‘defense in depth’ security posture

    1. Photo of Mike Hine

      Mike Hine

      Deputy Editor, Infosecurity Magazine

  14. In Every Dream Home a Security Heartache

    What more can you say about the connected home environment? Well when it comes to security, quite a bit really

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  15. The Pitfalls of Password Strength Meters

    Can you rely on algorithms and strength meters to confirm the strength of your passwords?

    1. Photo of David Harley

      David Harley

      Retired Cybersecurity Expert

  16. Acumin: Salaries Rising Across the Security Sector

    Acumin’s annual Salary Index for the UK information security industry collates salary data on a breadth of job functions and professions, based on engagements of live roles from the last 12 months

    1. Photo of Ryan Farmer

      Ryan Farmer

      Manager, Candidate Development, Acumin Consulting

  17. Returning to Bletchley Park

    Peter Berlich pays a visit to the National Museum of Computing

    1. Photo of Peter  Berlich

      Peter Berlich

      Management Consultant, Birchtree Consulting

  18. Securing Joined-up Government: the UK’s Public Service Network (PSN)

    UK government organizations, and those that have a need to interact with them, can apply to join the UK Public Service Network (PSN). However, to do so they must be able to ensure and prove their use of the PSN is compliant. Network access control (NAC) technology helps achieve this goal

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  19. When Good Code Goes Bad

    A June 2015 analysis of over 100,000 software development organizations reveals average downloads of known vulnerable software components exceeds 15,000 annually

    1. Photo of Derek E. Weeks

      Derek E. Weeks

      VP and DevOps Advocate, Sonatype

  20. A Passion for Online Safety, Part 4

    In the fourth and final part of Peter Berlich’s series on (ISC)2’s Safe and Secure Online program, he interviews the scheme’s founder

    1. Photo of Peter  Berlich

      Peter Berlich

      Management Consultant, Birchtree Consulting

What’s Hot on Infosecurity Magazine?