Infosecurity Magazine Features

  1. Will the GDPR help the CISO?

    The General Data Protection Regulation will be the biggest shake up of data protection measures in almost 20 years, so what does it mean for your average security type? Dan Raywood talked to Quentyn Taylor for his two year predictions.

  2. Mobile Payments, How Secure?

    Mobile payments have taken off, with Apple Pay and contactless cards now widely accepted, but how can retailers be sure these payments are secure and can’t be counterfeited or intercepted?

  3. Mr Retail Security

    Sitting in the central London office of UK high street powerhouse M&S, head of information security Lee Barney talked to me about the changes he has overseen since he took the job in 2015.

  4. Retail Security - Lessons Learned Two Years On

    Two years on from these headlines, the focus of attackers appears to have switched away from retailers to the healthcare sector, where the lucrative bounty of personally identifiable information is available.

  5. The Cybercrime Corporation

    With estimates that hackers who steal just 50 credit card numbers can make up to $1 million, there is little doubt that cybercrime pays. However, cybercrime is not just big business when it comes to revenue lines. Over the last five years we have seen this underground economy reshape itself into a sophisticated enterprise, adopting the same hierarchy, sales models and marketing practices as legal businesses.

    1. Photo of Rick Orloff

      Rick Orloff

      CSO at Code42

  6. GDPR – Good for the DPO

    The long awaited reform of the European data protection laws will be implemented in 2018. Dan Raywood talked to Tim Turner and Jon Baines from the National Association of Data Protection Officers (NADPO) about how changes are affecting those doing the job.

  7. Backdoors in Technology - is Privacy and Investigation Possible?

    In the recent legal case between Apple and the Federal Bureau of Investigation, the FBI wanted to force Apple to provide a security bypass to allow access to a dead gunman’s iPhone. Encrypted devices have been a bugbear of law enforcement agencies for some time and FBI Director James Comey has been vocal about the damage being done to investigations stating: “I don’t know why we would want to put people beyond the law.”

    1. Photo of Rob Sloan

      Rob Sloan

      Head of Cyber Content and Data, Dow Jones

  8. How Safe Behind the Privacy Shield?

    The October 2015 European Court of Justice (CJEU) decision invalidating Safe Harbor, the workaround agreement under which companies were allowed to transfer EU citizens' personal data to the US, which lacks comparable data protection laws, opened the way for months of uncertainty.

    1. Wendy M. Grossman

      Contributing Writer

  9. Would Like to Meet

    San Francisco resident Chris Orris uses an electronic dating service called ‘Coffee Meets Bagel’ (CMB). The site, which draws on users’ Facebook information to recommend potential mates, enjoys a positive reputation. In 2014, CMB made Time Magazine’s top ten list of apps for people who want to fall in love.

    1. Photo of Patchen Barss

      Patchen Barss

      Journalist and Author

  10. Brexit - Goodbye EU, Hello Cyber Chaos?

    Between Westminster posturing and political expediency, shameless scaremongering and unseemingly jingoism, the debate over whether a ‘Brexit’ could affect the UK’s cybersecurity industry has largely been ignored by those who should know better. A poll by Tech London Advocates of its 3,000 senior members in March found a resounding 80%+ want to stay in the EU, but there are some who remain undecided or actively hostile to the status quo.

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

  11. Taking the Offensive – Disrupting Cybercrime

    As the threat of cyber-attacks grows, businesses are struggling to keep pace with the constantly evolving tactics of cyber-criminals, hacktivists, state sponsored attacks and even cyber-terrorists.

    1. Photo of Mark Hughes

      Mark Hughes

      President of BT Security

  12. NAC Passes the Crown – to NAC

    In the past, NAC was first and foremost meant to address otherwise cumbersome ways of managing network connections.

    1. Photo of Tara Seals

      Tara Seals

      US/North America News Reporter, Infosecurity Magazine

  13. CyberCenturion 2016 Winners Crowned at Bletchley Park Final

    In April this year, the historic venue of The National Museum of Computing (TNMOC) played host to the national finals of CyberCenturion 2016, a country-wide cybersecurity contest aimed at discovering and developing the cyber skills of youngsters in the UK. It was a school team from Gibraltar who eventually took the spoils after a day of fast-paced cyber competition at Bletchley Park, sponsored by Cyber Security Challenge UK and global security company Northrop Grumman.

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  14. Securing the Human to be Mightier than the Computer

    People, not technology, are becoming the key to securing organizations today. For years organizations have invested in technology such as anti-virus, firewalls, full disk encryption or data loss prevention.

    1. Photo of Lance Spitzner

      Lance Spitzner

      Director, SANS

  15. Securing Apps Critical to Advancing mHealth

    What started with a wave of fitness tracking tools has rapidly evolved into an active marketplace of smartphone apps and add-ons, networked personal health devices, Big Data analytics, and transformative healthcare delivery models.

    1. Photo of Sam Rehman

      Sam Rehman

      CTO of Arxan Technologies

  16. Top 5 “Anti-Resolutions” to Fix Cyber-security in 2016

    To move forward in a healthier direction, I’ve identified five common approaches organizations should avoid for a more productive 2016.

    1. Photo of Jack Danahy

      Jack Danahy

      co-founder and CTO of Barkly

  17. Trust Who You Are Online With

    The basic problem is that the internet was built, famously, without an identity layer. That is, its design includes no way for anyone to know with certainty what or which whom they are connecting.

    1. Wendy M. Grossman

      Contributing Writer

  18. Suffering Security Lag?

    The recent spate of security incidents provides timely evidence that our adoption of technology appears to be outstripping our ability to protect it.

    1. Photo of Steven Furnell

      Steven Furnell

      Professor of Cyber Security, University of Nottingham

  19. DMARC Specification Poised to Take Webmail Woes by Storm in 2016

    The DMARC specification has been developed for web-based mail, which makes it virtually impossible for attackers to spoof, or fake, emails from a protected domain.

    1. Photo of Tara Seals

      Tara Seals

      US/North America News Reporter, Infosecurity Magazine

  20. TalkTalk: the British Entry for Breach of the Year 2015

    Everything’s always ‘bigger and better’ in the US, or at least that’s what they say. Unfortunately for federal employees and American consumers, this also means data breaches that have hit tens of millions over the past year.

    1. Photo of Phil Muncaster

      Phil Muncaster

      UK / EMEA News Reporter, Infosecurity Magazine

What’s hot on Infosecurity Magazine?