Infosecurity Blogs

  1. A Day in the Life of an IT Pro: Poisoned by the Ethernet

    As I’ve previously mentioned, being an IT Pro can often require some super sleuthing. Sometimes this can be through the actual systems and networks, and sometimes it means donning the cloak and hat and physically hunting down the issue.

    1. Photo of Kent Row

      Kent Row

      IT Admin, AKA Super Hero, SolarWinds

  2. The Rise and Rise of Bad Bots – Part 2: Beyond Web-Scraping

    Some bots have good intentions when they visit your web site, but many do not. How do you tell good bots from bad bots and control or block them?

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  3. The Rise and Rise of Bad Bots – Part 1: Little DDoS

    Bots do many useful things on the web, but all too often they are up to no good. This two part blog starts but looking at bot-driven denial of service and the growing problem of short duration distraction attacks.

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  4. #RSAC: Android: Malware? What Malware?

    Android malware (or Potentially Harmful Applications): a problem, or overstated?

    1. Photo of David Harley

      David Harley

      Retired Cybersecurity Expert

  5. Online Security in the Insurance Sector

    By admission of its own IT leaders, insurance companies are less advanced when it comes to IT security than banks. There are plenty of reasons to catch up.

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  6. A Day in the Life of an IT Pro: A Virtual Lesson in Virtualization

    The life of an IT admin is full of challenges, and technological changes are driving the role into new territory

    1. Photo of Kent Row

      Kent Row

      IT Admin, AKA Super Hero, SolarWinds

  7. A Day Out at CRESTCon & IISP Congress 2015

    Security conferences in London are not in short supply, with several occurring this week alone. Given this state of affairs, standing out from the crowd is not an easy task – but it’s a challenge that CRESTCon & IISP Congress approached head-on

    1. Photo of Mike Hine

      Mike Hine

      Deputy Editor, Infosecurity Magazine

  8. Cybersecurity in an Age of Austerity

    Back in 2010 the UK government promised £650m spending on cybersecurity over four years, with further funding to follow by 2016. Turn the clock forward five years, and the coalition has successfully delivered on its pledge amidst a culture of cuts to other sectors

    1. Photo of Mike Hine

      Mike Hine

      Deputy Editor, Infosecurity Magazine

  9. Facebook Expertly Increases Its Data Stash

    On the Friday before Super Bowl 2015, while America was obsessing over a gridiron game, Facebook quietly released an update to its privacy policies. Was this timing a cunning move using distraction as the background?

    1. Photo of Mark Weinstein

      Mark Weinstein

      CEO, MeWe.com

  10. Ask the CISO: Third-Party Vendor Management

    Should we be documenting our relationships with third-party vendors and should third-party vendors be required to incorporate security controls?

    1. Photo of David Cass

      David Cass

      CISO - IBM Cloud SaaS Operational Services, IBM MaaS360

  11. Security and the Cool Factor

    Getting users to implement security into their lives may be a difficult task without the help of the marketing and advertising machinery of major tech companies

    1. Photo of Mike Hine

      Mike Hine

      Deputy Editor, Infosecurity Magazine

  12. Ask the CISO

    Do you have a burning information security question that you would like to ask a CISO? If so, this is the forum for you to ask those questions.

    1. Photo of David Cass

      David Cass

      CISO - IBM Cloud SaaS Operational Services, IBM MaaS360

  13. For Security, Organizational Structure May be Overrated

    The reporting structure of the security function is a frequent point of discussion. Its prominence in the organizational chart will influence the amount of change it can drive. But regardless of where it ends up, its key asset in times of crisis isn’t reporting lines but the network of security and IT people it can draw on

    1. Photo of Peter  Berlich

      Peter Berlich

      Management Consultant, Birchtree Consulting

  14. A Day in the Life of an IT Pro: The Random Crisis Conundrum

    Working as an IT pro might not sound the like the most exciting role, but I like to think it is like being a detective

    1. Photo of Kent Row

      Kent Row

      IT Admin, AKA Super Hero, SolarWinds

  15. The Social Media Censor-Ship Has Sailed

    The time has come to stop haranguing tech companies for their capacity to be misused

    1. Photo of Mike Hine

      Mike Hine

      Deputy Editor, Infosecurity Magazine

  16. Which Side are You On?

    The Q1 issue’s cover story tracked the so-called ‘cryptowar’ between governments and technology companies, who are, once again, squaring up over encryption.

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  17. Tapsnake Infection: Not Very Likely

    Pop-up messages telling you that you have a Tapsnake infection? Pretty unlikely

    1. Photo of David Harley

      David Harley

      Retired Cybersecurity Expert

  18. A Day in the Life of an IT Pro…The Watchman’s Blindness

    The life of an IT admin is full of challenges, and technological changes are driving the role into new territory. Keeping a watchful eye on all systems therefore, remains key

    1. Photo of Kent Row

      Kent Row

      IT Admin, AKA Super Hero, SolarWinds

  19. Banning Encryption May Sound Absurd, But We Shouldn’t Laugh it Off

    Tragic incidents like the Paris shootings must not be politically misused by the UK government as an opportunity to deprive individuals and businesses of their freedom to communicate

    1. Photo of Mike Hine

      Mike Hine

      Deputy Editor, Infosecurity Magazine

  20. Many Attacks May Still Be Random; Security Should Not Be

    Targeted attacks are getting all the headlines, but random attacks are still a widespread and insidious, but avoidable problem.

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

What’s hot on Infosecurity Magazine?