Infosecurity Blogs
Come Spy with Me: Drones and Info-Sec
As drone use increases, new challenges are emerging with regard to privacy and information security.
Repetition is (The) Key
Education and awareness will go a long way in protecting your business against many types of cybercrime. But creating a risk-conscious workplace is easier said than done. Of course, the first step in making your staff aware of possible threats is training. But how much of this training do you remember months or even years later?
Working With Giants – 25 Years of IT Security
Symantec's June 2016 announcement that it intends to buy Blue Coat mirrors Trend Micro's acquisition of Tipping Point in 2015. Both moves underline that there is an appetite for integrated offerings from the broad play security giants.
Getting Serious About Thwarting Cyber-Criminals
The theory behind protecting company sensitive information from attackers has not changed much in close to two decades, yet a shocking number of organizations still deploy inadequate defences.
Why Sharing, Not Secrecy, Can be Better for Security
GDPR requires organizations to document publicly the fact that they have experienced a breach and the extent of it, at the time it occurred.
UK's Most Innovative Small Cyber Security Company Named at #Infosec16
It is great to see new companies entering the industry and after covering the Innovation Sandbox at RSA Conference earlier this year, I was very interested to see Infosecurity Europe follow suit with a session “UK's Most Innovative Small Cyber Security Company of the Year: Competition Final”.
Fixing the UK’s Ransomware Problem
Prevention is always better than cure, but the state of the UK’s businesses when it comes to shoring up user security is shockingly poor, which is extremely worrying when the threat is growing.
Ten Compelling Reasons to Improve Security when Harnessing the Power of Desktop Virtualization
10 tips to help you assert control over enterprise mobility while ensuring compliance and security.
Nine Steps to The GDPR
Here are some the steps organizations can take to stay ahead of the reforms taking effect in 2018.
Persuading Employees They Are Your Organization’s First Line of Defence
What is less well known is how to turn employees into a company’s strongest line of defense.
Traditional Security Tools Fail Against Modern-Day Threats
What can companies do to implement a holistic security infrastructure that defends against evolving, modern-day threats?
The Nature of Camouflage
PowerShell is an example of a native tool that can be utilized to infiltrate a company.
First the IP Bill, Then What?
It seems that with regrettable flippancy, the Investigatory Powers Bill will be passed later this year.
Threat Intelligence - The Answer to Threats or Another Fad?
The threat landscape has been dynamic and ever changing, and the growth and rapid advancement in cyber-attacks against enterprises and individuals have rendered traditional cyber-security measures virtually obsolete.
The Overlooked Elements of InfoSec: Solving the Unknown Unknowns
If there’s a golden rule around InfoSec, it probably amounts to “you have to know what exists on your network to effectively protect it.”
How Information Resilience can Help Businesses Secure Their Place in Tomorrow’s Supply Chain
The proper protection of a business’ digital information is a growing concern, and one that must be addressed to ensure the long-term prosperity of an organization.
Why Preventing Rooting and Jailbreaking is so Important
Although rooting and jailbreaking are technically different processes on different platforms, the end-goal is the same.
Why Employees Are Taxing Your Cyber Security Team’s Patience
Tax season shouldn’t put an undue burden on the IT team.
IT Untethered – How Wireless is Changing the World
Wi-Fi started out as way to make local area networks easier to deploy. Now, coupled with cellular networks, the rise ubiquitous mobility and the IoT, wireless is changing the world and there are security issues to consider.
Securing the Connected Organization
Victoria Windsor, Content Manager for Infosecurity Europe, looks at the challenges businesses face to secure their connected enterprise in 2016