Infosecurity Blogs

  1. Tapsnake Infection: Not Very Likely

    Pop-up messages telling you that you have a Tapsnake infection? Pretty unlikely

    1. Photo of David Harley

      David Harley

      Retired Cybersecurity Expert

  2. A Day in the Life of an IT Pro…The Watchman’s Blindness

    The life of an IT admin is full of challenges, and technological changes are driving the role into new territory. Keeping a watchful eye on all systems therefore, remains key

    1. Photo of Kent Row

      Kent Row

      IT Admin, AKA Super Hero, SolarWinds

  3. Banning Encryption May Sound Absurd, But We Shouldn’t Laugh it Off

    Tragic incidents like the Paris shootings must not be politically misused by the UK government as an opportunity to deprive individuals and businesses of their freedom to communicate

    1. Photo of Mike Hine

      Mike Hine

      Deputy Editor, Infosecurity Magazine

  4. Many Attacks May Still Be Random; Security Should Not Be

    Targeted attacks are getting all the headlines, but random attacks are still a widespread and insidious, but avoidable problem.

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  5. A Day in the Life of an IT Pro… Wire Straits: When the Server Room Becomes Spaghetti Junction

    The life of an IT admin is full of challenges, and technological changes are driving the role into new territory. However, sometimes technology isn't the only challenge to IT admins...

    1. Photo of Kent Row

      Kent Row

      IT Admin, AKA Super Hero, SolarWinds

  6. Securing Virtual Worlds, Part 1: The Virtual Infrastructure

    When considering the security of virtual environments, there are two basic levels, the virtual platform itself and the virtual machines (VM) and associated applications deployed on such platforms. This is the first of two Quocirca blog posts focused on the platform itself.

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  7. Don't Manufacture Cyber-Risk

    The industrial sector is rapidly realizing the vast potential for digital-physical systems to improve efficiency and performance. However, this realization is going to incur an increase in both cyber-risk likelihood and impact to the sector’s production processes, supply chains and workforce

    1. Photo of Daniel Cannon

      Daniel Cannon

      Senior Technical Consultant, IRM

  8. A Day in the Life of Kent Row…IT Admin AKA Super Hero

    The life of an IT admin is full of challenges, and technological changes are driving the role into new territory. It's essential that business relationships keep up with the pace of change

    1. Photo of Kent Row

      Kent Row

      IT Admin, AKA Super Hero, SolarWinds

  9. IRISSCON 2014: Security Tales from the Emerald Isle

    Ireland's premier cyber-security conference was an effective platform for discussion on the key challenges facing the industry

    1. Photo of Mike Hine

      Mike Hine

      Deputy Editor, Infosecurity Magazine

  10. The Problem of Buggy Software Components

    Security teams face a risk with software components developed out of house

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  11. NCSAM Wrap Up: A Boatload Of Security Tips At Your Fingertips

    With National Cyber Security Awareness Month (NCSAM) coming to a close, it’s a good time to reflect on some of the topics published by (ISC)2 to help educate users from all walks of life

  12. Wearable Tech: Preparing for a Smarter Future

    With the Apple Watch set to truly kickstart the wearable boom, what are the security implications of a potential surge in new, smarter technology?

    1. Photo of Mike Hine

      Mike Hine

      Deputy Editor, Infosecurity Magazine

  13. Trading in privacy doesn't increase security

    Apple and Google are encrypting phones by default; Twitter, Facebook and others are increasing the security and privacy of their users. But law enforcement agencies in the US and UK are concerned by a perceived loss of access to the data. Is it worth trading in the privacy of our digital lives for the promise of security in the real world?

    1. Photo of Martin McKeay

      Martin McKeay

      Editorial Director, Akamai

  14. #InfosecHeroes Nominate & Donate

    Nominate an information security professional that you consider has brought some outstanding achievements to the industry, whilst raising money for WhiteHatRally

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  15. Critical National Infrastructure: How to Protect Vital Systems

    Critical National Infrastructure is dependent on network communications, which should be protected in the same way as dedicated IT networks. This includes security information and event monitoring (SIEM)

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  16. Shadow IT in Stores and Branches: How to Stay Compliant

    Branches are where the rubber still hits the road for many organisations; where retailers still do most of their selling, where much banking is still carried out and where health care is often dispensed. However, for IT managers, branches are outliers, where rogue activity is hard to curb; this means branches can become security and compliance black spots.

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  17. Setting a Dangerous Precedent: It's Foreign

    We're seeing a dangerous precedent being set by US and UK governments because law enforcement and legislators believe information held in foreign servers should be subject to a different set of standards than that held on their own soil.

    1. Martin McKeay

      Senior Security Advocate, Akamai

  18. (ISC)2 Congress 2014: Why Information Security Needs to Exchange ‘Jack of all Trades’ for Specialists

    Today, at the (ISC)2 Congress in Atlanta, I sat down with Richard Nealon, and put the (infosec) world to rights, discussing the transformation of the information security professional, the future of the CISO role, and how information security needs to get more value from its pound (or dollar, or euro).

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  19. Don't track my children

    Increasingly we see tracking of students in schools, both their location and their activity. This data is being captured and retained in the hope of providing better security and better education to our children. But what is the price we pay for these promises and are they even being delivered upon?

    1. Photo of Martin McKeay

      Martin McKeay

      Editorial Director, Akamai

  20. Thoughts on Privacy, Information Sharing and Skills from Black Hat and B-Sides

    It’s now over a month since I boarded a flight back to London from Las Vegas, following four roller coaster days of meetings, presentations, parties and, unfortunately, for the first time in my life, jet-lag.

    1. Photo of Victoria Windsor

      Victoria Windsor

      Content Manager, Infosecurity Magazine

What’s Hot on Infosecurity Magazine?