Infosecurity Blogs
Retail Sector Breaches: What Can We Learn?
Addressing the common avenues of data breach will go a long way to thwarting hackers
Li-Fi fantastic – Quocirca’s Report from Infosec 2015
Many of the mainstream vendors were banging the same drum at Infosec 2015 held at Olympia in Early June; you had to look hard for something completely different
A Passion for Online Safety, Part 2
After overviewing the (ISC)2 Safe and Secure Online program in Part 1, Peter Berlich interviews one of its leading lights
Houses in Motion: Security Gets Ready For a Change
Infosecurity Europe presented an industry that finds itself at a tipping point, asking whether the fundamentals need to be reimagined
#infosec15: The Role of the News Media in Security
How press and the security industry can work together
All Set Up for Defending your Company
Writing this from a vantage point above the main exhibition floor at Infosecurity Europe, the day before the industry flagship opens, the concept of ‘security set-up’ takes on a whole new meaning
A Passion for Online Safety, Part 1
(ISC)2 Foundation’s Safe and Secure Online program is a unique charitable effort linking (ISC)2-certified information security experts to schools and other community groups
A Day in the Life of an IT Pro: Just Listen to Teacher
I have written a lot about network security and how to track down rogue issues during this series. However, as an IT Pro my role is also to advise and teach those around me about the pros and cons of adopting new technologies.
Mr. President, Backdoors are Stupid
As pressure mounts in the US to pass laws requiring tech companies to include backdoors in their technologies, tech companies push back with a letter to President Obama.
The Great Schism: Cybersecurity in Fact and Fiction
Carey Nachenberg's new novel raises questions about the relationship between fact and fiction in security
In Security, Stay Lean!
A security function should be lean and focused on managing controls. Tendencies to expand its scope, grow in size to become top-heavy, or allow overly hierarchical structures to develop, are potentially harmful
Dealing with Information Overload
Events and conferences come thick and fast in the security industry, and it’s sometimes hard to find time to sit and reflect on each one
Goodbye For Now
As I get ready to send to press what will be the last issue of Infosecurity that I work on for a year, allow me to indulge in a trip down memory lane as I pick nine of my favourite memories from my nine years at the best information security magazine and news site there is.
A Day in the Life of an IT Pro: Poisoned by the Ethernet
As I’ve previously mentioned, being an IT Pro can often require some super sleuthing. Sometimes this can be through the actual systems and networks, and sometimes it means donning the cloak and hat and physically hunting down the issue.
The Rise and Rise of Bad Bots – Part 2: Beyond Web-Scraping
Some bots have good intentions when they visit your web site, but many do not. How do you tell good bots from bad bots and control or block them?
The Rise and Rise of Bad Bots – Part 1: Little DDoS
Bots do many useful things on the web, but all too often they are up to no good. This two part blog starts but looking at bot-driven denial of service and the growing problem of short duration distraction attacks.
#RSAC: Android: Malware? What Malware?
Android malware (or Potentially Harmful Applications): a problem, or overstated?
Online Security in the Insurance Sector
By admission of its own IT leaders, insurance companies are less advanced when it comes to IT security than banks. There are plenty of reasons to catch up.
A Day in the Life of an IT Pro: A Virtual Lesson in Virtualization
The life of an IT admin is full of challenges, and technological changes are driving the role into new territory