Infosecurity Blogs
Accepting the Unknown Risk
Host Unknown return from a musical hiatus to their CISSP video, to rap about risk acceptance.
Bug Bounties and Crowdsourcing Security
Are Bug Bounty programs effective at fixing vulnerabilities or simply crowdsourced security?
Review: 'The Power of Privacy'
The Guardian and US-tech company Silent Circle release documentary exploring digital security.
Where There's a Will
Inheriting IT hardware: when it comes to access software and services, legality and authentication can be complicated.
It Shouldn't Matter how Many USBs are Lost
The proliferation of data loss stories in the media proves that the problem of human error, or indeed, human nature, isn't going anywhere.
A Year in Vendor Patching: Does an Increase in Patches Mean we are More or Less Secure?
Why was 2015 such an insecure year for vendors and why did cyber-threats see a marked increase?
Dunce Hat or Laptop of Doom? The Choice is Yours
Should there be a dunce hat or slow laptop issued to those members of staff who make constant mistakes? Kent Row thinks so.
At Least 1 in 5 European Enterprises Loses Data Through Targeted Cyber Attacks
Many European businesses now see targeted cyber-attacks as an inevitability that must be managed. New Quocirca research looks at the experiences of 600 European enterprises over the last 12 months and lists the worst 40 reported incidents.
Neustar to Securely Guide Things
Neustar, a supplier of real time online information services, is re-thinking its priorities as it has had to re-align its business in the USA. The growth of the internet of things should see its star rise in Europe and elsewhere.
A Simpler Online Life: Trusted Use of Your Social Identity
Using social identities to login to other services can make our online lives more convenient and secure. However, there must be choice, and backend identity management must evolve to support the concept.
Containing the application security problem
Containerisation is proving to be a popular and effective way of deploying apps, especially in a DevOps environment. This poses new security challenges, but also new security solutions.
The IOT’s Journey from the Spy in the Cab to the Flat (Cow) Field
Are IOT use cases totally at mercy of legislatures whose decisions, could be as far reaching as they are unpredictable?
Better Late Than Never
Even in this era of embracing technology, there is still a vast void between understanding the technology, and recognizing the implied significance imposed on any scene-of-crime.
A Synchronized Approach to Network and Endpoint Threat Intel
A synchronized security protection approach that takes a fresh view of how threat intel can be used
Terror Warning Messages Spread Malware
The efforts target United Arab Emirates-based companies and employees, as well as Bahrain, Turkey and, more recently, Canada.
Why the Legal Profession Needs to Think About Visual Privacy
Increased focus on visual privacy is taking place across the board, but particularly in some professions, of which legal is a good example.
Protection—From Inside Out
Defending against hacks is very much a case of looking to both the inside and outside of organizations.
Don’t Get Bitten: The Story of the Social RAT-in-the-Browser
The next generation of Remote Access Trojans could make fraudsters more eager than ever to find new solutions that help penetrate user networks quickly and easily
Individual Privacy: The Latest Victim of Anonymous Hacks?
Although Anonymous has galvanized a cult-like following into the age of 21st century civil disobedience, the internet has long been known to house a dungeon of unsupported information, and anonymity has occasionally added fuel to the fire.
They Also Serve, Those That Keep Things Ticking Over
Nice to haves in business are very much a thing of the past. But what about those items that are essential whose immediate value is not readily apparent.