Infosecurity Blogs
My First Eight Weeks in Infosecurity
As I approach the end of my second month as the Deputy Editor at Infosecurity Magazine, I feel now is a good time to take a short breather and reflect on what the last several weeks have taught me about an industry that, two months ago, I knew very little about.
The Skills Gap, it's Cause and How to Close It
A look at how the current skills gap is affecting the cybersecurity industry, why it exists and how to turn things around
The Three “M”s of a Successful Career in Information Security
These “Three Ms of Success”, when implemented, will ensure success for your career in information security.
Transatlantic Data Security
Trade agreements between the US and EU may level the playing field for the many businesses that trade on both sides of the Atlantic, but the EU will still have different rules regarding data protection
Bug Bounties - The Resolution to Software Flaws
"We get more bug reports, which means we get more bug fixes, which means a better experience for our users."
The Danger of Free SSL Certificates
When Amazon ACM issues certificates, the corresponding private keys are stored in the cloud.
Cybercrime 'Suspects': Who Are Companies Up Against?
In ‘The Unusual Suspects’ Dr Adrian Nish discusses the six specific cybercriminal ‘suspects’ that companies are facing.
Support Scammers Targeting Dell Customers
If Dell customer data is in the hands of support scammers, irrespective of how it was acquired, perhaps it's time for Dell to be more proactive in warning its customers?
Cyber Security in the Middle East
Pakistan and the UAE is stepping up efforts to defend against cyber-crime
A Big Year Ahead for IoT
New study reveals businesses have big plans for IoT in 2016, but highlights concerns over the security risks that come with it
Love Is in the Air, and So Are Security Threats
It may be the most romantic day of the year but that hasn’t lessened any of the security risks for online shoppers and dating app users.
The ‘Human’ Side of Cybersecurity
Arm your people with security knowledge, and you'll see the benefits.
Cyber Security Training and Certifications have Expanded Rapidly, Where Should you Focus?
Cybersecurity training courses and certifications have exploded in popularity over the last five years.
Error 53 is “for your own good" says Apple. Experts disagree
The issue is being called the "Error 53" problem, and so far there's no fix.
What Motivates Cyber-criminals and Who Are They Targeting?
A peek into the world of cyber-criminals, what motivates them and who they are targeting.
Fear of the Unknown – How to Survive
While the average employee might not understand something as sophisticated as software defined networking, they likely understand the function of the network and have a general understanding of the cloud.
Five Cybersecurity Questions Every Executive Should Ask
Executives should regularly ask five questions of those responsible for cybersecurity concerning the level of cyber-risk their organization is carrying.
The Rise and Rise of Public Cloud Services
Cloud enthusiastic digital natives are now gaining business management positions, whilst shadow IT is becoming an accepted norm. The choice IT departments face is no longer whether or not to adopt cloud-based services, but about the security that is put in place to support their use.
Blue Coat, from Surf Control to Riding the Security Wave
Over the last 20 years Blue Coat has grown from a niche player in the network performance to stand alongside the giants of IT security. This has mainly been achieved through a long series of acquisitions—more will likely follow.
‘Flipping the Economics of Attacks’ – A Report
What does this new report teach us about cyber-criminals and how to stop them?