Infosecurity Opinions

Comment: Anti-Malware Automation Tools Save Time and Money
IT budgets continue to be squeezed while malware challenges become more formidable each day. Matt Allen of Norman Data Defense Systems discusses how sandboxing technologies can deliver on cost-effectiveness and timeliness claims by doing high-volume malware analysis in a safe environment.

Comment: Avoiding and recovering from nasty network configuration mistakes
Network mistakes constantly happen throughout the day and are the bane of the network manager. Reuven Harrison, CTO of Tufin Technologies, provides some excellent hints and tips for network managers

Comment: A new generation will demand a change in the role of security
Redstone’s Martin Blackhurst examines the effects that future employees from the “Facebook generation” will have on maintaining IT security.

Comment: SaaS Offerings for Wireless PCI Compliance
The first PCI DSS compliance deadline is approaching in September, and with that comes the ever-growing concerns over protecting payment card information transmitted over wireless connections. Ajay Kumar Gupta of AirTight Networks discusses the various SaaS offerings that allow small and medium-sized business to achieve compliance while improving WiFi security.

Comment: Context-aware security in VDI implementations
Bob Janssen of RES Software examines how secure desktop virtualization can be achieved using a context-centric approach

Comment: Black Swans, Secure Access and Business Continuity
How can businesses deliver flexible, scalable and secure remote access to staff during contingencies, while controlling costs? Check Point’s Nick Lowe describes a new approach to the problem

Comment: Protect our data – set it free
Privacy is a two way street – we need to free data as well as protect it says Jonathan Raper, professor of information science at City University London. Read his thoughts on why the new UK government needs to implement what he calls a “digital social contract”.

Comment: PCI DSS compliance in the cloud
With the PCI DSS compliance deadline rapidly approaching, Star’s Hugo Harber examines the issues card processors must address to maintain compliance when storing data on hosted cloud services

Comment: Can smartphone applications help terrorists communicate without detection?
Duncan Pauly of CopperEye explains how IP technologies may be providing new ways for terrorist activity to go unnoticed

Comment: The long-term cost of instant security gratification
Geoff Webb of NetIQ asks if we really can achieve greater security by rushing to invest in the latest security tools that vendors have to offer. His thoughts may surprise you.

Comment: Compliance trends on the horizon
Cheryl Klein of GRC Consulting believes that a focus on automation is the single best way to keep compliance costs manageable, especially for medium and smaller-sized businesses

Comment: Security Risk Exposure Increases due to Windows 7 Virtual Wi-Fi Capability
Ajay Kumar Gupta of AirTight Networks examines how new Wi-Fi capabilities in Windows 7 can lead to unauthorized network access and subsequent security issues

Comment: Are we winning the war against cybercrime?
Simone Seth from the Information Security Forum asks if we are winning the fight against the cyber criminals

Comment: “Maslow’s” Hierarchy of Security
Security professionals can benefit or even learn from ideas and concepts found in other disciplines. One such area is psychology, and Alex Clayton of 3i provides an example to illustrate this point.

Comment: IT security implications for the War on Terror
John Poulter of Informatica examines why IT security professionals in both the private and public sector are primary combatants in the global War on Terror. He explores options on aiding this process, and how to do so without ‘breaking the bank’

Comment: We need to address the silo mentality in infosecurity
Tony Dyhouse expresses his concern that the lack of information sharing among organizations will keep the information security community one step behind cybercriminals

Comment: Security doubts about the cloud
According to VASCO Data Security’s Jan Valcke, strong authentication can surmount end-users’ security concerns and prevents revenue loss for SaaS providers

Comment: Top reasons why corporate Wi-Fi clients connect to unauthorized networks
Ajay Kumar Gupta of AirTight Networks reviews some of the most common reasons why corporate Wi-Fi users connect to unauthorized networks and what can be done to combat the problem.

Comment: Maintaining data integrity for your organization
Simon Morris of Pentura debates the issue of data security and the importance of identity authentication when dealing with confidential and sensitive data.

Comment: Securing the mobile workforce and your company's data
Andy Cordial of Origin Storage provides tips for organizations seeking to secure data in a world where mobile tools are quickly becoming primary devices for employees.



