Infosecurity Blogs

  1. Mobile Payment, Your Time has Come

    2015 will be the year when the floodgates open on contactless mobile payments

    1. Photo of Mike Hine

      Mike Hine

      Deputy Editor, Infosecurity Magazine

  2. Lifting the Fog of Ignorance in IT Security

    Effective operational intelligence improves insight into increasingly complex IT infrastructure and the way it is used to transact with customers. This reduces the concern IT managers have in many areas, with the exception of IT security where deeper insight causes alarm

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  3. A Passion For Online Safety, Part 3

    In Parts 1 & 2 Peter Berlich gave an overview of the (ISC)2 Safe and Secure Online program and interviewed director Julie Peeler. Here he profiles the volunteer’s role

    1. Photo of Peter  Berlich

      Peter Berlich

      Management Consultant, Birchtree Consulting

  4. Is Your Identity and Access Management Fit for Purpose?

    European organizations are struggling to adapt legacy identity and access management (IAM) systems for integrating external users. Many are turning to IAM-as-a-service to supplement in-house systems

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  5. Five Factors to Consider When Looking For a Data Security Provider

    Protecting employee data, client data, and internal company information has never been as important. Your organization needs to adopt effective services that manage your information, protect your most critical data and, above all, streamline processes.

    1. Photo of Jenny Richards

      Jenny Richards

      Content Marketer, RemoteDBA.com

  6. Privacy Wars: A Tale of Two Tims

    The gloves are officially off in Silicon Valley

    1. Photo of Mark Weinstein

      Mark Weinstein

      CEO, MeWe.com

  7. Netanyahu at the 5th Annual Cybersecurity Conference: Challenge Assumptions

    Israeli Prime Minister Benjamin Netanyahu gave the opening speech at the 5th annual CyberSecurity Conference in Tel Aviv, Israel this morning. He believes cyber security is the future of his country

    1. Photo of Martin McKeay

      Martin McKeay

      Editorial Director, Akamai

  8. CISOs Go From 'No' to 'Know'

    Vendor offerings line up well with CISO desires at the annual Eskenzi PR CISO forum

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  9. Hanging on the Telephone

    Survey ‘shows’ that mobiles are bad for your heath; but what about your company’s wealth?

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  10. Security, Soundbites, and Password Recovery Abuse

    A recent blog by Graham Cluley drew my attention to an unpleasant little scam apparently aimed at users of webmail services

    1. Photo of David Harley

      David Harley

      Retired Cybersecurity Expert

  11. Retail Sector Breaches: What Can We Learn?

    Addressing the common avenues of data breach will go a long way to thwarting hackers

    1. Photo of Dimitrios Fragiskatos

      Dimitrios Fragiskatos

      Technical Consultant, IRM

  12. Li-Fi fantastic – Quocirca’s Report from Infosec 2015

    Many of the mainstream vendors were banging the same drum at Infosec 2015 held at Olympia in Early June; you had to look hard for something completely different

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  13. A Passion for Online Safety, Part 2

    After overviewing the (ISC)2 Safe and Secure Online program in Part 1, Peter Berlich interviews one of its leading lights

    1. Photo of Peter  Berlich

      Peter Berlich

      Management Consultant, Birchtree Consulting

  14. Houses in Motion: Security Gets Ready For a Change

    Infosecurity Europe presented an industry that finds itself at a tipping point, asking whether the fundamentals need to be reimagined

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  15. #infosec15: The Role of the News Media in Security

    How press and the security industry can work together

    1. Photo of Mike Hine

      Mike Hine

      Deputy Editor, Infosecurity Magazine

  16. All Set Up for Defending your Company

    Writing this from a vantage point above the main exhibition floor at Infosecurity Europe, the day before the industry flagship opens, the concept of ‘security set-up’ takes on a whole new meaning

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  17. A Passion for Online Safety, Part 1

    (ISC)2 Foundation’s Safe and Secure Online program is a unique charitable effort linking (ISC)2-certified information security experts to schools and other community groups

    1. Photo of Peter  Berlich

      Peter Berlich

      Management Consultant, Birchtree Consulting

  18. A Day in the Life of an IT Pro: Just Listen to Teacher

    I have written a lot about network security and how to track down rogue issues during this series. However, as an IT Pro my role is also to advise and teach those around me about the pros and cons of adopting new technologies.

    1. Photo of Kent Row

      Kent Row

      IT Admin, AKA Super Hero, SolarWinds

  19. Security: It’s All about the People

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  20. Mr. President, Backdoors are Stupid

    As pressure mounts in the US to pass laws requiring tech companies to include backdoors in their technologies, tech companies push back with a letter to President Obama.

    1. Photo of Martin McKeay

      Martin McKeay

      Editorial Director, Akamai

What’s Hot on Infosecurity Magazine?