Infosecurity Blogs

  1. Don't Worry About The Government: Quis Custodiet Ipsos Custodes

    The phrase ‘just because you’re paranoid doesn’t mean they’re not out to get you’ has become something of a hoary old cliché. But for UK MPs, the phrase has a very contemporary and relevant meaning

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  2. Closing the Net on Attackers

    It’s become a consistent adage in security that defense no longer stops at the perimeter. There is so much more to consider in a modern ‘defense in depth’ security posture

    1. Photo of Mike Hine

      Mike Hine

      Deputy Editor, Infosecurity Magazine

  3. In Every Dream Home a Security Heartache

    What more can you say about the connected home environment? Well when it comes to security, quite a bit really

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  4. The Pitfalls of Password Strength Meters

    Can you rely on algorithms and strength meters to confirm the strength of your passwords?

    1. Photo of David Harley

      David Harley

      Retired Cybersecurity Expert

  5. Acumin: Salaries Rising Across the Security Sector

    Acumin’s annual Salary Index for the UK information security industry collates salary data on a breadth of job functions and professions, based on engagements of live roles from the last 12 months

    1. Photo of Ryan Farmer

      Ryan Farmer

      Manager, Candidate Development, Acumin Consulting

  6. Returning to Bletchley Park

    Peter Berlich pays a visit to the National Museum of Computing

    1. Photo of Peter  Berlich

      Peter Berlich

      Management Consultant, Birchtree Consulting

  7. Securing Joined-up Government: the UK’s Public Service Network (PSN)

    UK government organizations, and those that have a need to interact with them, can apply to join the UK Public Service Network (PSN). However, to do so they must be able to ensure and prove their use of the PSN is compliant. Network access control (NAC) technology helps achieve this goal

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  8. When Good Code Goes Bad

    A June 2015 analysis of over 100,000 software development organizations reveals average downloads of known vulnerable software components exceeds 15,000 annually

    1. Photo of Derek E. Weeks

      Derek E. Weeks

      VP and DevOps Advocate, Sonatype

  9. A Passion for Online Safety, Part 4

    In the fourth and final part of Peter Berlich’s series on (ISC)2’s Safe and Secure Online program, he interviews the scheme’s founder

    1. Photo of Peter  Berlich

      Peter Berlich

      Management Consultant, Birchtree Consulting

  10. 3 Qualities of Effective IT Security Managers

    The role of the IT security manager is getting ever-more complex. Increasingly relied on by the business to safeguard valuable assets while enabling digital innovation and flexible working practices, it's fair to say that information security is now more mission-critical than ever. So how can IT security managers rise to the new challenges they face?

    1. Photo of Liam Harcourt

      Liam Harcourt

      Technical Consultant, IRM

  11. Mobile Payment, Your Time has Come

    2015 will be the year when the floodgates open on contactless mobile payments

    1. Photo of Mike Hine

      Mike Hine

      Deputy Editor, Infosecurity Magazine

  12. Lifting the Fog of Ignorance in IT Security

    Effective operational intelligence improves insight into increasingly complex IT infrastructure and the way it is used to transact with customers. This reduces the concern IT managers have in many areas, with the exception of IT security where deeper insight causes alarm

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  13. A Passion For Online Safety, Part 3

    In Parts 1 & 2 Peter Berlich gave an overview of the (ISC)2 Safe and Secure Online program and interviewed director Julie Peeler. Here he profiles the volunteer’s role

    1. Photo of Peter  Berlich

      Peter Berlich

      Management Consultant, Birchtree Consulting

  14. Is Your Identity and Access Management Fit for Purpose?

    European organizations are struggling to adapt legacy identity and access management (IAM) systems for integrating external users. Many are turning to IAM-as-a-service to supplement in-house systems

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  15. Five Factors to Consider When Looking For a Data Security Provider

    Protecting employee data, client data, and internal company information has never been as important. Your organization needs to adopt effective services that manage your information, protect your most critical data and, above all, streamline processes.

    1. Photo of Jenny Richards

      Jenny Richards

      Content Marketer, RemoteDBA.com

  16. Privacy Wars: A Tale of Two Tims

    The gloves are officially off in Silicon Valley

    1. Photo of Mark Weinstein

      Mark Weinstein

      CEO, MeWe.com

  17. Netanyahu at the 5th Annual Cybersecurity Conference: Challenge Assumptions

    Israeli Prime Minister Benjamin Netanyahu gave the opening speech at the 5th annual CyberSecurity Conference in Tel Aviv, Israel this morning. He believes cyber security is the future of his country

    1. Photo of Martin McKeay

      Martin McKeay

      Editorial Director, Akamai

  18. CISOs Go From 'No' to 'Know'

    Vendor offerings line up well with CISO desires at the annual Eskenzi PR CISO forum

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  19. Hanging on the Telephone

    Survey ‘shows’ that mobiles are bad for your heath; but what about your company’s wealth?

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  20. Security, Soundbites, and Password Recovery Abuse

    A recent blog by Graham Cluley drew my attention to an unpleasant little scam apparently aimed at users of webmail services

    1. Photo of David Harley

      David Harley

      Retired Cybersecurity Expert

What’s hot on Infosecurity Magazine?