Infosecurity Blogs
On the Second Day of Christmas, the Industry Predicted…Poor Routine IT Practices
Poor routine IT practices will cause the most avoidable harm to businesses next year
On the First Day of Christmas, the Industry Predicted...MORE RANSOMWARE
As 2016 draws to a close, what lessons can be drawn from a year that was immersed in cybersecurity controversy and headline-making news, and what predictions can be made about what we expect to face in 2017?
Trading in Compromised Remote Desktop Services
There is a criminal underworld of compromised services in existence on dark web forums
‘We'll Always Have Paris’ – Highlights from ISSE Conference 2016
This week the beautiful city of Paris played host to the 17th annual ISSE Conference, bringing together a raft of security professionals and experts from around the world to discuss, debate and shape the future of digital identity
Closing the Gender Gap in Cybersecurity: Its Time to Back Ourselves as an Industry
Cybersecurity is facing a frightening skills gap, so to put it simply, we need more people, so we need more women
Assessing the Cost of Brexit from a Cybersecurity Standpoint
The cybersecurity community is equally looking to assess the impact of Brexit
5 Common Mistakes When Dealing with Security Stakeholders – and How to Avoid Them
Managing an initiative as business-critical as cybersecurity means IT and security leaders need to work closely with various stakeholders to agree to the security strategy, put them at ease that it will work and give them confidence that it will be effective
Everything You Need to Know About RDNH
Every business needs to take great care with its domain name. This is the word or words you choose to form your website address, literally your identity on the world wide web
The Pitfalls of Awareness
Dr Jessica Barker reveals the three pitfalls of security awareness
#FutureDecoded Dreaming of Electric Employees
If you believed that terms such as artificial intelligence (AI), machine learning and digital transformation were the stuff of science fiction, then other sections of IT are proving that this is the new reality.
Mirai - How a Botnet Made IoT a Security Reality
I’ve been hearing about IoT for a number of years, and it was not until 2013 until I understood what the concept was about, and sometime after that the term was more defined as the concept of connected devices became more of a reality.
International Cybersecurity Regulation Needs to Become Standard
Harshul Joshi, DarkMatter, explains why international cybersecurity regulation needs to become the standard now
Roundtable: Former Deputy Director of NSA Talks Insider Threats
Chris Inglis discusses the insider threat talking his experiences with the NSA, transparency and the use of behavior analytics
The Shape of Things to Come – Advanced Networking Security for IoT
There are all sorts of potential for IoT-related applications to streamline business processes and provide new ways of interacting with customers.
The Rise of DDoS in IOT
Bryan Campbell, Fujitsu, explores the rise of DDoS in IoT
#ISC2CongressEMEA: The Monkey, The Human & The Cybersecurity Awareness Program
When it comes to security training and awareness, the prime objective of many organizations is to be able to demonstrate that all staff have completed security awareness training.
#ISC2CongressEMEA: Combined Mitigation for Cyber and Physical Attacks
At the (ISC)2 Congress EMEA in Dublin on October 18 2016, Barrie Millett drew upon his experience from the military and his resilience roles at E.ON and GE to advise on combined mitigation for cyber and physical attacks.
The Yahoo hack – a numbers game
Have you got a Yahoo email account? Was it one of the 500 million accounts compromised by the breach disclosed by Yahoo in September 2016? Does it matter if it was?
Nok Nok adds a risk engine for FIDO driven authentication
The addition of a risk engine to Nok Nok’s FIDO-driven Authentication Server further strengthens the way web service providers can authenticate the consumers they transact with.
Digital Rights Management 2.0
There nothing new about the need for digital rights management (DRM). However, what DRM tools are expected to achieve has changed over the last decade or so.