Infosecurity Blogs

Mirai - How a Botnet Made IoT a Security Reality

Mirai - How a Botnet Made IoT a Security Reality

I’ve been hearing about IoT for a number of years, and it was not until 2013 until I understood what the concept was about, and sometime after that the term was more defined as the concept of connected devices became more of a reality.

International Cybersecurity Regulation Needs to Become Standard

International Cybersecurity Regulation Needs to Become Standard

Harshul Joshi, DarkMatter, explains why international cybersecurity regulation needs to become the standard now

Roundtable: Former Deputy Director of NSA Talks Insider Threats

Roundtable: Former Deputy Director of NSA Talks Insider Threats

Chris Inglis discusses the insider threat talking his experiences with the NSA, transparency and the use of behavior analytics

The Shape of Things to Come – Advanced Networking Security for IoT

The Shape of Things to Come – Advanced Networking Security for IoT

There are all sorts of potential for IoT-related applications to streamline business processes and provide new ways of interacting with customers.

The Rise of DDoS in IOT

The Rise of DDoS in IOT

Bryan Campbell, Fujitsu, explores the rise of DDoS in IoT

#ISC2CongressEMEA: The Monkey, The Human & The Cybersecurity Awareness Program

#ISC2CongressEMEA: The Monkey, The Human & The Cybersecurity Awareness Program

When it comes to security training and awareness, the prime objective of many organizations is to be able to demonstrate that all staff have completed security awareness training.

#ISC2CongressEMEA: Combined Mitigation for Cyber and Physical Attacks

#ISC2CongressEMEA: Combined Mitigation for Cyber and Physical Attacks

At the (ISC)2 Congress EMEA in Dublin on October 18 2016, Barrie Millett drew upon his experience from the military and his resilience roles at E.ON and GE to advise on combined mitigation for cyber and physical attacks.

The Yahoo hack – a numbers game

The Yahoo hack – a numbers game

Have you got a Yahoo email account? Was it one of the 500 million accounts compromised by the breach disclosed by Yahoo in September 2016? Does it matter if it was?

Nok Nok adds a risk engine for FIDO driven authentication

Nok Nok adds a risk engine for FIDO driven authentication

The addition of a risk engine to Nok Nok’s FIDO-driven Authentication Server further strengthens the way web service providers can authenticate the consumers they transact with.

Digital Rights Management 2.0

Digital Rights Management 2.0

There nothing new about the need for digital rights management (DRM). However, what DRM tools are expected to achieve has changed over the last decade or so.

Biometrics: the New Frontier in Security, but Why Aren’t We There Yet?

Biometrics: the New Frontier in Security, but Why Aren’t We There Yet?

Biometrics is often considered to be the cutting-edge technology that the security industry needs to adopt to help drive innovation in the digital age

#ISC2Congress: How to Hire and Get Hired in Infosec

#ISC2Congress: How to Hire and Get Hired in Infosec

The session contained a lot of really useful insight and advice on how to hire, and get hired, in information security.

Our Bloggers

What’s Hot on Infosecurity Magazine?