Infosecurity Opinions

  1. Comment: PCI DSS compliance in the cloud

    With the PCI DSS compliance deadline rapidly approaching, Star’s Hugo Harber examines the issues card processors must address to maintain compliance when storing data on hosted cloud services

  2. Comment: Can smartphone applications help terrorists communicate without detection?

    Duncan Pauly of CopperEye explains how IP technologies may be providing new ways for terrorist activity to go unnoticed

  3. Comment: The long-term cost of instant security gratification

    Geoff Webb of NetIQ asks if we really can achieve greater security by rushing to invest in the latest security tools that vendors have to offer. His thoughts may surprise you.

  4. Comment: Compliance trends on the horizon

    Cheryl Klein of GRC Consulting believes that a focus on automation is the single best way to keep compliance costs manageable, especially for medium and smaller-sized businesses

  5. Comment: Security Risk Exposure Increases due to Windows 7 Virtual Wi-Fi Capability

    Ajay Kumar Gupta of AirTight Networks examines how new Wi-Fi capabilities in Windows 7 can lead to unauthorized network access and subsequent security issues

  6. Comment: Are we winning the war against cybercrime?

    Simone Seth from the Information Security Forum asks if we are winning the fight against the cyber criminals

  7. Comment: “Maslow’s” Hierarchy of Security

    Security professionals can benefit or even learn from ideas and concepts found in other disciplines. One such area is psychology, and Alex Clayton of 3i provides an example to illustrate this point.

  8. Comment: IT security implications for the War on Terror

    John Poulter of Informatica examines why IT security professionals in both the private and public sector are primary combatants in the global War on Terror. He explores options on aiding this process, and how to do so without ‘breaking the bank’

  9. Comment: We need to address the silo mentality in infosecurity

    Tony Dyhouse expresses his concern that the lack of information sharing among organizations will keep the information security community one step behind cybercriminals

  10. Comment: Security doubts about the cloud

    According to VASCO Data Security’s Jan Valcke, strong authentication can surmount end-users’ security concerns and prevents revenue loss for SaaS providers

  11. Comment: Top reasons why corporate Wi-Fi clients connect to unauthorized networks

    Ajay Kumar Gupta of AirTight Networks reviews some of the most common reasons why corporate Wi-Fi users connect to unauthorized networks and what can be done to combat the problem.

  12. Comment: Maintaining data integrity for your organization

    Simon Morris of Pentura debates the issue of data security and the importance of identity authentication when dealing with confidential and sensitive data.

  13. Comment: Securing the mobile workforce and your company's data

    Andy Cordial of Origin Storage provides tips for organizations seeking to secure data in a world where mobile tools are quickly becoming primary devices for employees.

  14. Comment: With information security, you must regulate yourself

    Morey Haber of eEye Digital Security believes that information security is a horizontal issue that we regulate vertically. Here he examines why this tactic is putting us all at risk.

  15. Comment: Addressing identity and access management challenges in the retail sector

    John Handelaar of Passlogix knows that one password is always easier to remember than two or three, but how can an organization both streamline access management processes while maintaining identity security for its customers?

  16. Comment: Cybercrime - Still a growth industry?

    One business most likely to be booming in the next year is that of cybercrime, says Charlie Abrahams of MarkMonitor

  17. Comment: The magic triangle of information security

    Senior IT security veteran Michael Oberlaender explains why availability, integrity, and confidentiality of information are all vital to an organization’s goals and reputation. He also examines the balancing act of security, costs, and functionality that must be evaluated by any IT security professional.

  18. Comment: Securing web 2.0 in the workplace

    Simon Morris, research and development director at Pentura looks at how the adoption of web 2.0 makes the job of keeping email and the web free from attacks, malware and spam even more difficult. Yet, simply closing access to unapproved tools can be short sighted as unhappy employees drift to rival businesses with more enlightened policies

  19. Comment: Making protection against the impossible information security threats, possible

    The information security industry is changing and as more and more crime is committed online, security software vendors will have no choice but to adjust. Kevin Hogan, director of Symantec’s response centre explains how it is leading the market in responding to this shift…

  20. Comment: Exit strategy - How forensic ready are you?

    Losing a key employee is never easy, but it can be harder still if they take confidential company information with them. Duncan Gardiner, director forensic services at Epiq Systems outlines the steps that companies can take to protect their positions, both before and after such an event.

What’s Hot on Infosecurity Magazine?