Infosecurity Blogs

  1. Retail Sector Breaches: What Can We Learn?

    Addressing the common avenues of data breach will go a long way to thwarting hackers

    1. Photo of Dimitrios Fragiskatos

      Dimitrios Fragiskatos

      Technical Consultant, IRM

  2. Li-Fi fantastic – Quocirca’s Report from Infosec 2015

    Many of the mainstream vendors were banging the same drum at Infosec 2015 held at Olympia in Early June; you had to look hard for something completely different

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  3. A Passion for Online Safety, Part 2

    After overviewing the (ISC)2 Safe and Secure Online program in Part 1, Peter Berlich interviews one of its leading lights

    1. Photo of Peter  Berlich

      Peter Berlich

      Management Consultant, Birchtree Consulting

  4. Houses in Motion: Security Gets Ready For a Change

    Infosecurity Europe presented an industry that finds itself at a tipping point, asking whether the fundamentals need to be reimagined

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  5. #infosec15: The Role of the News Media in Security

    How press and the security industry can work together

    1. Photo of Mike Hine

      Mike Hine

      Deputy Editor, Infosecurity Magazine

  6. All Set Up for Defending your Company

    Writing this from a vantage point above the main exhibition floor at Infosecurity Europe, the day before the industry flagship opens, the concept of ‘security set-up’ takes on a whole new meaning

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  7. A Passion for Online Safety, Part 1

    (ISC)2 Foundation’s Safe and Secure Online program is a unique charitable effort linking (ISC)2-certified information security experts to schools and other community groups

    1. Photo of Peter  Berlich

      Peter Berlich

      Management Consultant, Birchtree Consulting

  8. A Day in the Life of an IT Pro: Just Listen to Teacher

    I have written a lot about network security and how to track down rogue issues during this series. However, as an IT Pro my role is also to advise and teach those around me about the pros and cons of adopting new technologies.

    1. Photo of Kent Row

      Kent Row

      IT Admin, AKA Super Hero, SolarWinds

  9. Security: It’s All about the People

    1. Photo of Joe O'Halloran

      Joe O'Halloran

      Editor In Chief, Rapid TV News

  10. Mr. President, Backdoors are Stupid

    As pressure mounts in the US to pass laws requiring tech companies to include backdoors in their technologies, tech companies push back with a letter to President Obama.

    1. Photo of Martin McKeay

      Martin McKeay

      Editorial Director, Akamai

  11. The Great Schism: Cybersecurity in Fact and Fiction

    Carey Nachenberg's new novel raises questions about the relationship between fact and fiction in security

    1. Photo of David Harley

      David Harley

      Retired Cybersecurity Expert

  12. In Security, Stay Lean!

    A security function should be lean and focused on managing controls. Tendencies to expand its scope, grow in size to become top-heavy, or allow overly hierarchical structures to develop, are potentially harmful

    1. Photo of Peter  Berlich

      Peter Berlich

      Management Consultant, Birchtree Consulting

  13. Dealing with Information Overload

    Events and conferences come thick and fast in the security industry, and it’s sometimes hard to find time to sit and reflect on each one

    1. Photo of Mike Hine

      Mike Hine

      Deputy Editor, Infosecurity Magazine

  14. Goodbye For Now

    As I get ready to send to press what will be the last issue of Infosecurity that I work on for a year, allow me to indulge in a trip down memory lane as I pick nine of my favourite memories from my nine years at the best information security magazine and news site there is.

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  15. A Day in the Life of an IT Pro: Poisoned by the Ethernet

    As I’ve previously mentioned, being an IT Pro can often require some super sleuthing. Sometimes this can be through the actual systems and networks, and sometimes it means donning the cloak and hat and physically hunting down the issue.

    1. Photo of Kent Row

      Kent Row

      IT Admin, AKA Super Hero, SolarWinds

  16. The Rise and Rise of Bad Bots – Part 2: Beyond Web-Scraping

    Some bots have good intentions when they visit your web site, but many do not. How do you tell good bots from bad bots and control or block them?

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  17. The Rise and Rise of Bad Bots – Part 1: Little DDoS

    Bots do many useful things on the web, but all too often they are up to no good. This two part blog starts but looking at bot-driven denial of service and the growing problem of short duration distraction attacks.

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  18. #RSAC: Android: Malware? What Malware?

    Android malware (or Potentially Harmful Applications): a problem, or overstated?

    1. Photo of David Harley

      David Harley

      Retired Cybersecurity Expert

  19. Online Security in the Insurance Sector

    By admission of its own IT leaders, insurance companies are less advanced when it comes to IT security than banks. There are plenty of reasons to catch up.

    1. Photo of Bob Tarzey

      Bob Tarzey

      Analyst and Director, Quocirca

  20. A Day in the Life of an IT Pro: A Virtual Lesson in Virtualization

    The life of an IT admin is full of challenges, and technological changes are driving the role into new territory

    1. Photo of Kent Row

      Kent Row

      IT Admin, AKA Super Hero, SolarWinds

What’s hot on Infosecurity Magazine?