Infosecurity Blogs

  1. Five Factors to Consider When Looking For a Data Security Provider

    Protecting employee data, client data, and internal company information has never been as important. Your organization needs to adopt effective services that manage your information, protect your most critical data and, above all, streamline processes.

    1. Photo of Jenny Richards

      Jenny Richards

      Content Marketer, RemoteDBA.com

  2. Privacy Wars: A Tale of Two Tims

    The gloves are officially off in Silicon Valley

    1. Photo of Mark Weinstein

      Mark Weinstein

      CEO, MeWe.com

  3. Netanyahu at the 5th Annual Cybersecurity Conference: Challenge Assumptions

    Israeli Prime Minister Benjamin Netanyahu gave the opening speech at the 5th annual CyberSecurity Conference in Tel Aviv, Israel this morning. He believes cyber security is the future of his country

    1. Photo of Martin McKeay

      Martin McKeay

      Editorial Director, Akamai

  4. CISOs Go From 'No' to 'Know'

    Vendor offerings line up well with CISO desires at the annual Eskenzi PR CISO forum

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  5. Hanging on the Telephone

    Survey ‘shows’ that mobiles are bad for your heath; but what about your company’s wealth?

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  6. Security, Soundbites, and Password Recovery Abuse

    A recent blog by Graham Cluley drew my attention to an unpleasant little scam apparently aimed at users of webmail services

    1. Photo of David Harley

      David Harley

      Retired Cybersecurity Expert

  7. Retail Sector Breaches: What Can We Learn?

    Addressing the common avenues of data breach will go a long way to thwarting hackers

    1. Photo of Dimitrios Fragiskatos

      Dimitrios Fragiskatos

      Technical Consultant, IRM

  8. Li-Fi fantastic – Quocirca’s Report from Infosec 2015

    Many of the mainstream vendors were banging the same drum at Infosec 2015 held at Olympia in Early June; you had to look hard for something completely different

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  9. A Passion for Online Safety, Part 2

    After overviewing the (ISC)2 Safe and Secure Online program in Part 1, Peter Berlich interviews one of its leading lights

    1. Photo of Peter  Berlich

      Peter Berlich

      Management Consultant, Birchtree Consulting

  10. Houses in Motion: Security Gets Ready For a Change

    Infosecurity Europe presented an industry that finds itself at a tipping point, asking whether the fundamentals need to be reimagined

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  11. #infosec15: The Role of the News Media in Security

    How press and the security industry can work together

    1. Photo of Mike Hine

      Mike Hine

      Deputy Editor, Infosecurity Magazine

  12. All Set Up for Defending your Company

    Writing this from a vantage point above the main exhibition floor at Infosecurity Europe, the day before the industry flagship opens, the concept of ‘security set-up’ takes on a whole new meaning

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  13. A Passion for Online Safety, Part 1

    (ISC)2 Foundation’s Safe and Secure Online program is a unique charitable effort linking (ISC)2-certified information security experts to schools and other community groups

    1. Photo of Peter  Berlich

      Peter Berlich

      Management Consultant, Birchtree Consulting

  14. A Day in the Life of an IT Pro: Just Listen to Teacher

    I have written a lot about network security and how to track down rogue issues during this series. However, as an IT Pro my role is also to advise and teach those around me about the pros and cons of adopting new technologies.

    1. Photo of Kent Row

      Kent Row

      IT Admin, AKA Super Hero, SolarWinds

  15. Security: It’s All about the People

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  16. Mr. President, Backdoors are Stupid

    As pressure mounts in the US to pass laws requiring tech companies to include backdoors in their technologies, tech companies push back with a letter to President Obama.

    1. Photo of Martin McKeay

      Martin McKeay

      Editorial Director, Akamai

  17. The Great Schism: Cybersecurity in Fact and Fiction

    Carey Nachenberg's new novel raises questions about the relationship between fact and fiction in security

    1. Photo of David Harley

      David Harley

      Retired Cybersecurity Expert

  18. In Security, Stay Lean!

    A security function should be lean and focused on managing controls. Tendencies to expand its scope, grow in size to become top-heavy, or allow overly hierarchical structures to develop, are potentially harmful

    1. Photo of Peter  Berlich

      Peter Berlich

      Management Consultant, Birchtree Consulting

  19. Dealing with Information Overload

    Events and conferences come thick and fast in the security industry, and it’s sometimes hard to find time to sit and reflect on each one

    1. Photo of Mike Hine

      Mike Hine

      Deputy Editor, Infosecurity Magazine

  20. Goodbye For Now

    As I get ready to send to press what will be the last issue of Infosecurity that I work on for a year, allow me to indulge in a trip down memory lane as I pick nine of my favourite memories from my nine years at the best information security magazine and news site there is.

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

What’s hot on Infosecurity Magazine?