Infosecurity Blogs

  1. Accepting the Unknown Risk

    Host Unknown return from a musical hiatus to their CISSP video, to rap about risk acceptance.

  2. Bug Bounties and Crowdsourcing Security

    Are Bug Bounty programs effective at fixing vulnerabilities or simply crowdsourced security?

    1. Photo of Rob Sloan

      Rob Sloan

      Head of Cyber Content and Data, Dow Jones

  3. Review: 'The Power of Privacy'

    The Guardian and US-tech company Silent Circle release documentary exploring digital security.

    1. Photo of Michael Hill

      Michael Hill

      Former Editor, Infosecurity Magazine

  4. Where There's a Will

    Inheriting IT hardware: when it comes to access software and services, legality and authentication can be complicated.

    1. Photo of David Harley

      David Harley

      Retired Cybersecurity Expert

  5. It Shouldn't Matter how Many USBs are Lost

    The proliferation of data loss stories in the media proves that the problem of human error, or indeed, human nature, isn't going anywhere.

    1. Photo of Norman Shaw

      Norman Shaw

      Founder and CEO of ExactTrak

  6. A Year in Vendor Patching: Does an Increase in Patches Mean we are More or Less Secure?

    Why was 2015 such an insecure year for vendors and why did cyber-threats see a marked increase?

    1. Photo of  Andrew Tang

      Andrew Tang

      Service Director, Security, MTI Technology

  7. Dunce Hat or Laptop of Doom? The Choice is Yours

    Should there be a dunce hat or slow laptop issued to those members of staff who make constant mistakes? Kent Row thinks so.

    1. Photo of Kent Row

      Kent Row

      IT Admin, AKA Super Hero, SolarWinds

  8. At Least 1 in 5 European Enterprises Loses Data Through Targeted Cyber Attacks

    Many European businesses now see targeted cyber-attacks as an inevitability that must be managed. New Quocirca research looks at the experiences of 600 European enterprises over the last 12 months and lists the worst 40 reported incidents.

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  9. Neustar to Securely Guide Things

    Neustar, a supplier of real time online information services, is re-thinking its priorities as it has had to re-align its business in the USA. The growth of the internet of things should see its star rise in Europe and elsewhere.

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  10. A Simpler Online Life: Trusted Use of Your Social Identity

    Using social identities to login to other services can make our online lives more convenient and secure. However, there must be choice, and backend identity management must evolve to support the concept.

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  11. Containing the application security problem

    Containerisation is proving to be a popular and effective way of deploying apps, especially in a DevOps environment. This poses new security challenges, but also new security solutions.

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  12. The IOT’s Journey from the Spy in the Cab to the Flat (Cow) Field

    Are IOT use cases totally at mercy of legislatures whose decisions, could be as far reaching as they are unpredictable?

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  13. Better Late Than Never

    Even in this era of embracing technology, there is still a vast void between understanding the technology, and recognizing the implied significance imposed on any scene-of-crime.

    1. Photo of John  Walker

      John Walker

      Visiting Professor at the School of Science & Technology - Nottingham Trent University

  14. A Synchronized Approach to Network and Endpoint Threat Intel

    A synchronized security protection approach that takes a fresh view of how threat intel can be used

    1. Photo of Tara Seals

      Tara Seals

      US/North America News Reporter, Infosecurity Magazine

  15. Terror Warning Messages Spread Malware

    The efforts target United Arab Emirates-based companies and employees, as well as Bahrain, Turkey and, more recently, Canada.

    1. Photo of Tara Seals

      Tara Seals

      US/North America News Reporter, Infosecurity Magazine

  16. Why the Legal Profession Needs to Think About Visual Privacy

    Increased focus on visual privacy is taking place across the board, but particularly in some professions, of which legal is a good example.

  17. Protection—From Inside Out

    Defending against hacks is very much a case of looking to both the inside and outside of organizations.

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  18. Don’t Get Bitten: The Story of the Social RAT-in-the-Browser

    The next generation of Remote Access Trojans could make fraudsters more eager than ever to find new solutions that help penetrate user networks quickly and easily

    1. Photo of Oren Kedem

      Oren Kedem

      Vice President of Product Management, BioCatch

  19. Individual Privacy: The Latest Victim of Anonymous Hacks?

    Although Anonymous has galvanized a cult-like following into the age of 21st century civil disobedience, the internet has long been known to house a dungeon of unsupported information, and anonymity has occasionally added fuel to the fire.

    1. Photo of Jean-Loup Richet

      Jean-Loup Richet

      Research Fellow, ESSEC ISIS

  20. They Also Serve, Those That Keep Things Ticking Over

    Nice to haves in business are very much a thing of the past. But what about those items that are essential whose immediate value is not readily apparent.

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

What’s hot on Infosecurity Magazine?