Infosecurity Opinions

Anthem Reminds Us That We Need a New Tune for Data Security
A breach doesn’t have to result in the disaster experienced by Anthem and Sony, writes Ken Levine

PCI DSS 3.0 is Here – What Do Organizations Need to Know?
PCI DSS 3.0 brings with it a number of challenges to ensure compliance. Torsten George looks at how organizations can overcome these effectively

Ethics in the Antivirus Industry have Shifted
It’s not ethical for antivirus vendors to use misleading tactics to install PUPs in exchange for quick cash, says Christian Mairoll

Getting the Right Balance between Employee Enablement and Control
Russell Miller, former ethical hacker and current director in identity and access management at CA Technologies explores why protecting against insider threats is often a big challenge for organizations

Cybersecurity and the CFO: What Your Organization Needs to Know
The CFO’s role in an organization’s security operation is vital, and it’s crucial that companies recognize this, writes Steve Durbin

How to Mitigate the Security Risks Associated with the Public Cloud
Cost savings and convenience make cloud computing attractive to organizations – but there are a number of security priorities to consider, says Amit Cohen

Macs are Safer than PCs, Right?
Rick Delgado looks at the age-old fallacy that Macs are somehow invulnerable to attack

The UK Government Must Act Now on Cyber-Threats
Ash J. Hunt believes that the government is lagging behind in its policy and strategy regarding cyber-threats, and must act now

Looking Beyond the Biometrics Hype
Problems with biometric authentication mean it is far from a fool-proof security solution, argues Silvio Kutic

What the Citadel Can Teach Us about Computer Security
It’s time to turn the permissive computing model on its head, writes Brian Maccaba

Infosec and the Blame Game
Peter Berlich explores the challenge of keeping your professional integrity in an organization with a culture of blame

A Hybrid Approach: Rewriting the Rules for DDoS Defense
Dave Larson discusses why and how organizations should take a hybrid approach to DDoS protection

Big Data Poses Many Data Protection Questions
More and more companies now say that they are using or looking to use big data analytics in their business. But the concept of big data raises a number of issues for data protection and data security, says Paul Glass

Why Your Data May Need a Passport
The actual physical location of data is no longer cut and dry, as electronic forms of information and in particular, the cloud, have changed the entire IT landscape, says David Cannellos

Employees are the Missing Piece of the Security Puzzle
Security policies will not be successful without employee compliance, but almost a quarter of employees believe security is not their responsibility. Fordway’s Richard Blanford advises organizations to develop realistic security policies to encourage employee buy-in and use solutions such as DLP and single sign-on

Dealing with the Stress of an Infosec Job
IT security managers are pressured by the many demands of a job that requires them to deal with unpredictable technical issues, systems threats, administrative tasks, strict deadlines and certification requirements. Stress cannot be prevented – but it can be minimized with pre-planning and good communication, says Daniel Brecht

Data Protection Starts with Everyone
You and your co-workers are the final frontier in an organization’s breach defenses, writes Roy Peretz

2015 State of the Union Address: The Implications
The current proposals are the equivalent of putting up more security cameras instead of buying a better safe, says Bill Solms

Security Audit Policy is Essential in Ensuring Network Security
Failing an audit in an industry with tight regulatory compliance could have serious consequences – so make sure you’re on the ball, says Rupesh Kumar

Tackling A False Sense of Device Security
Vince Mazza addresses users’ security misconceptions surrounding smart devices – regardless of brand, he says, consumers need to be more vigilant when it comes to protecting their personal data























