Infosecurity Blogs
5 Common Mistakes When Dealing with Security Stakeholders – and How to Avoid Them
Managing an initiative as business-critical as cybersecurity means IT and security leaders need to work closely with various stakeholders to agree to the security strategy, put them at ease that it will work and give them confidence that it will be effective
Everything You Need to Know About RDNH
Every business needs to take great care with its domain name. This is the word or words you choose to form your website address, literally your identity on the world wide web
The Pitfalls of Awareness
Dr Jessica Barker reveals the three pitfalls of security awareness
#FutureDecoded Dreaming of Electric Employees
If you believed that terms such as artificial intelligence (AI), machine learning and digital transformation were the stuff of science fiction, then other sections of IT are proving that this is the new reality.
Mirai - How a Botnet Made IoT a Security Reality
I’ve been hearing about IoT for a number of years, and it was not until 2013 until I understood what the concept was about, and sometime after that the term was more defined as the concept of connected devices became more of a reality.
International Cybersecurity Regulation Needs to Become Standard
Harshul Joshi, DarkMatter, explains why international cybersecurity regulation needs to become the standard now
Roundtable: Former Deputy Director of NSA Talks Insider Threats
Chris Inglis discusses the insider threat talking his experiences with the NSA, transparency and the use of behavior analytics
The Shape of Things to Come – Advanced Networking Security for IoT
There are all sorts of potential for IoT-related applications to streamline business processes and provide new ways of interacting with customers.
The Rise of DDoS in IOT
Bryan Campbell, Fujitsu, explores the rise of DDoS in IoT
#ISC2CongressEMEA: The Monkey, The Human & The Cybersecurity Awareness Program
When it comes to security training and awareness, the prime objective of many organizations is to be able to demonstrate that all staff have completed security awareness training.
#ISC2CongressEMEA: Combined Mitigation for Cyber and Physical Attacks
At the (ISC)2 Congress EMEA in Dublin on October 18 2016, Barrie Millett drew upon his experience from the military and his resilience roles at E.ON and GE to advise on combined mitigation for cyber and physical attacks.
The Yahoo hack – a numbers game
Have you got a Yahoo email account? Was it one of the 500 million accounts compromised by the breach disclosed by Yahoo in September 2016? Does it matter if it was?
Nok Nok adds a risk engine for FIDO driven authentication
The addition of a risk engine to Nok Nok’s FIDO-driven Authentication Server further strengthens the way web service providers can authenticate the consumers they transact with.
Digital Rights Management 2.0
There nothing new about the need for digital rights management (DRM). However, what DRM tools are expected to achieve has changed over the last decade or so.
Biometrics: the New Frontier in Security, but Why Aren’t We There Yet?
Biometrics is often considered to be the cutting-edge technology that the security industry needs to adopt to help drive innovation in the digital age
#ISC2Congress: How to Hire and Get Hired in Infosec
The session contained a lot of really useful insight and advice on how to hire, and get hired, in information security.
#ISC2Congress: How to Mentor an Information Security Professional
Jeff Silver, senior security engineer at RSA corporation, gave a talk at (ISC)2 Congress in Orlando, Florida, on how to build up infosec professionals through mentoring programs.
#CLOUDSEC2016 : Tenacity and Problem-solving Trump CISSP, says Rik Ferguson
At CLOUDSEC in London on 6 September 2016, Rik Ferguson, VP president security research, Trend Micro, presented in a session titled ‘Take Control: Empower the People’
How Businesses Can Combat Cybercrime and Win the 'Cyberwar'
Data protection and security concerns around mobile devices are two serious cybercrime issues businesses both large and small must realize, while already happening today, are going to become even more prevalent tomorrow
Gotta Hack em’ All: Pokémon Go, Security and Privacy Awareness
The Pokémon Go incident served as a litmus test of where the average person stands in terms of their security and privacy awareness