Infosecurity Blogs
Five Factors to Consider When Looking For a Data Security Provider
Protecting employee data, client data, and internal company information has never been as important. Your organization needs to adopt effective services that manage your information, protect your most critical data and, above all, streamline processes.
Privacy Wars: A Tale of Two Tims
The gloves are officially off in Silicon Valley
Netanyahu at the 5th Annual Cybersecurity Conference: Challenge Assumptions
Israeli Prime Minister Benjamin Netanyahu gave the opening speech at the 5th annual CyberSecurity Conference in Tel Aviv, Israel this morning. He believes cyber security is the future of his country
CISOs Go From 'No' to 'Know'
Vendor offerings line up well with CISO desires at the annual Eskenzi PR CISO forum
Hanging on the Telephone
Survey ‘shows’ that mobiles are bad for your heath; but what about your company’s wealth?
Security, Soundbites, and Password Recovery Abuse
A recent blog by Graham Cluley drew my attention to an unpleasant little scam apparently aimed at users of webmail services
Retail Sector Breaches: What Can We Learn?
Addressing the common avenues of data breach will go a long way to thwarting hackers
Li-Fi fantastic – Quocirca’s Report from Infosec 2015
Many of the mainstream vendors were banging the same drum at Infosec 2015 held at Olympia in Early June; you had to look hard for something completely different
A Passion for Online Safety, Part 2
After overviewing the (ISC)2 Safe and Secure Online program in Part 1, Peter Berlich interviews one of its leading lights
Houses in Motion: Security Gets Ready For a Change
Infosecurity Europe presented an industry that finds itself at a tipping point, asking whether the fundamentals need to be reimagined
#infosec15: The Role of the News Media in Security
How press and the security industry can work together
All Set Up for Defending your Company
Writing this from a vantage point above the main exhibition floor at Infosecurity Europe, the day before the industry flagship opens, the concept of ‘security set-up’ takes on a whole new meaning
A Passion for Online Safety, Part 1
(ISC)2 Foundation’s Safe and Secure Online program is a unique charitable effort linking (ISC)2-certified information security experts to schools and other community groups
A Day in the Life of an IT Pro: Just Listen to Teacher
I have written a lot about network security and how to track down rogue issues during this series. However, as an IT Pro my role is also to advise and teach those around me about the pros and cons of adopting new technologies.
Mr. President, Backdoors are Stupid
As pressure mounts in the US to pass laws requiring tech companies to include backdoors in their technologies, tech companies push back with a letter to President Obama.
The Great Schism: Cybersecurity in Fact and Fiction
Carey Nachenberg's new novel raises questions about the relationship between fact and fiction in security
In Security, Stay Lean!
A security function should be lean and focused on managing controls. Tendencies to expand its scope, grow in size to become top-heavy, or allow overly hierarchical structures to develop, are potentially harmful
Dealing with Information Overload
Events and conferences come thick and fast in the security industry, and it’s sometimes hard to find time to sit and reflect on each one
Goodbye For Now
As I get ready to send to press what will be the last issue of Infosecurity that I work on for a year, allow me to indulge in a trip down memory lane as I pick nine of my favourite memories from my nine years at the best information security magazine and news site there is.