Infosecurity Blogs

  1. Countering the Terrorism Cyber-Threat

    With cyber terrorism in the spotlight, how are cyber-tactics being used as a means to aid and conduct terrorist activities and what is the distinction between use of the internet and offensive cyber-techniques?

    1. Photo of Tom Williams

      Tom Williams

      Head of Operations, Context Information Security

  2. Hacking Without Computers

    As organisations improve their network perimeter security, the human factor often presents the weakest link to protect information and assets.

    1. Photo of Owen  Wright

      Owen Wright

      Managing Director at Context, part of Accenture

  3. The Risk of ‘Visual Hacking’ in the Financial Services Industry

    As well as software-based systems, financial organisations are increasingly looking at the emerging threat vector of ‘visual hacking’, which is the risk around people being able to obtain information simply by glancing at a screen.

  4. A Day in the Life of an IT Pro: Bridging the Islands on the Company Continent

    In many companies, the business leadership team, the applications team and the infrastructure team are all different entities that can feel worlds apart. And their organizational goals and alignment can vary massively.

    1. Photo of Kent Row

      Kent Row

      IT Admin, AKA Super Hero, SolarWinds

  5. Happy Halloween - Putting the Genie Back Into the Bottle

    Those who maintain the required level of vigilance over the creep of technology may have either taken their eye of the ball for some considerable time

    1. Photo of John  Walker

      John Walker

      Visiting Professor at the School of Science & Technology - Nottingham Trent University

  6. Turn another Page on the Teenage Rampage

    Should we be reassessing what is indeed normal teenage behavior when it seems that breaking security systems seems to now pass for the norm

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  7. Ponemon Institute study demonstrates the impact of visual hacking

    Visual hacking is explained and demonstrated, while possible solutions to the problem are presented.

  8. #TalkTalk: No White Flags, But Now Dido Needs to Act

    Can it really be that all it took to take-down a top telco was a techie teen?

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  9. How to Fix the Internet of Broken Things

    One answer to security problems with the Internet of Things may be to change from the closed source approach with software to an open source and open security approach.

    1. Photo of Art  Swift

      Art Swift

      President, prpl Foundation

  10. The Security Challenges Threatening to Tear the Internet of Things Apart

    The Internet of Things has the power to transform our lives, but it’s also developing at such a rate that it threatens to outstrip our ability to adequately secure it.

    1. Photo of Art  Swift

      Art Swift

      President, prpl Foundation

  11. A Mission, Computers and Puzzles - What Could Be Better?

    We can’t start educating kids soon enough – a message that seems to be resonating beyond the walls of (ISC)² into the Halls of Congress, the academic community and corporate America.

  12. The Titan Pain of Dim Sum

    With the changing face of war, allowing other countries to operate potential attack facilities in one's own country is a major risk.

    1. Photo of John  Walker

      John Walker

      Visiting Professor at the School of Science & Technology - Nottingham Trent University

  13. Sound and Vision As Infosecurity Makes It Big On the Small Screen

    New cyber-crime drams breaks the fourth wall, dragging security out of its techie niche and into living rooms and most importantly boardrooms

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  14. Money’s Too Tight to Mention: Not for Infosecurity

    2015 will go down as the year when the security industry showed that the investment community was more than willing to put its money where its mouth was.

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  15. Sheep vs Cyber-Insurance

    Cyber-insurance can offer an additional level of protection to your organisation but can it give the desired level of protection?

    1. Photo of John  Walker

      John Walker

      Visiting Professor at the School of Science & Technology - Nottingham Trent University

  16. Infosecurity: Zip Up and Lose the Fear

    How are professionals implementing security architectures? How is how peopple working affecting efficacy of these systems?

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  17. Visual Hacking: The Eyes Have It

    Strangers on a train, shoulder surfing, and laptop privacy filters.

    1. Photo of David Harley

      David Harley

      Retired Cybersecurity Expert

  18. Your Not-So-Typical Cybersecurity Awareness Tips

    For those of us in the cybersecurity profession, the term “awareness” should not stop at educating users. As leaders in our field, the term must invoke a determination to address a workforce in crisis.

  19. Experian: It’s Our Data So We Must Demand MORE

    The Experian breach shows how our data and our lives are exposed to hackers, cyber criminals, state sponsored activities, and even authorized agencies.

    1. Photo of John  Walker

      John Walker

      Visiting Professor at the School of Science & Technology - Nottingham Trent University

  20. The Public Sector and Visual Privacy

    The public sector is arguably one of the market sectors that most closely appreciates the need for visual privacy as part of overall security strategies and is acting accordingly.

What’s hot on Infosecurity Magazine?