Infosecurity Magazine Features
Will the GDPR help the CISO?
The General Data Protection Regulation will be the biggest shake up of data protection measures in almost 20 years, so what does it mean for your average security type? Dan Raywood talked to Quentyn Taylor for his two year predictions.
Mobile Payments, How Secure?
Mobile payments have taken off, with Apple Pay and contactless cards now widely accepted, but how can retailers be sure these payments are secure and can’t be counterfeited or intercepted?
Mr Retail Security
Sitting in the central London office of UK high street powerhouse M&S, head of information security Lee Barney talked to me about the changes he has overseen since he took the job in 2015.
Retail Security - Lessons Learned Two Years On
Two years on from these headlines, the focus of attackers appears to have switched away from retailers to the healthcare sector, where the lucrative bounty of personally identifiable information is available.
The Cybercrime Corporation
With estimates that hackers who steal just 50 credit card numbers can make up to $1 million, there is little doubt that cybercrime pays. However, cybercrime is not just big business when it comes to revenue lines. Over the last five years we have seen this underground economy reshape itself into a sophisticated enterprise, adopting the same hierarchy, sales models and marketing practices as legal businesses.
GDPR – Good for the DPO
The long awaited reform of the European data protection laws will be implemented in 2018. Dan Raywood talked to Tim Turner and Jon Baines from the National Association of Data Protection Officers (NADPO) about how changes are affecting those doing the job.
Backdoors in Technology - is Privacy and Investigation Possible?
In the recent legal case between Apple and the Federal Bureau of Investigation, the FBI wanted to force Apple to provide a security bypass to allow access to a dead gunman’s iPhone. Encrypted devices have been a bugbear of law enforcement agencies for some time and FBI Director James Comey has been vocal about the damage being done to investigations stating: “I don’t know why we would want to put people beyond the law.”
How Safe Behind the Privacy Shield?
The October 2015 European Court of Justice (CJEU) decision invalidating Safe Harbor, the workaround agreement under which companies were allowed to transfer EU citizens' personal data to the US, which lacks comparable data protection laws, opened the way for months of uncertainty.
Would Like to Meet
San Francisco resident Chris Orris uses an electronic dating service called ‘Coffee Meets Bagel’ (CMB). The site, which draws on users’ Facebook information to recommend potential mates, enjoys a positive reputation. In 2014, CMB made Time Magazine’s top ten list of apps for people who want to fall in love.
Brexit - Goodbye EU, Hello Cyber Chaos?
Between Westminster posturing and political expediency, shameless scaremongering and unseemingly jingoism, the debate over whether a ‘Brexit’ could affect the UK’s cybersecurity industry has largely been ignored by those who should know better. A poll by Tech London Advocates of its 3,000 senior members in March found a resounding 80%+ want to stay in the EU, but there are some who remain undecided or actively hostile to the status quo.
Taking the Offensive – Disrupting Cybercrime
As the threat of cyber-attacks grows, businesses are struggling to keep pace with the constantly evolving tactics of cyber-criminals, hacktivists, state sponsored attacks and even cyber-terrorists.
NAC Passes the Crown – to NAC
In the past, NAC was first and foremost meant to address otherwise cumbersome ways of managing network connections.
CyberCenturion 2016 Winners Crowned at Bletchley Park Final
In April this year, the historic venue of The National Museum of Computing (TNMOC) played host to the national finals of CyberCenturion 2016, a country-wide cybersecurity contest aimed at discovering and developing the cyber skills of youngsters in the UK. It was a school team from Gibraltar who eventually took the spoils after a day of fast-paced cyber competition at Bletchley Park, sponsored by Cyber Security Challenge UK and global security company Northrop Grumman.
Securing the Human to be Mightier than the Computer
People, not technology, are becoming the key to securing organizations today. For years organizations have invested in technology such as anti-virus, firewalls, full disk encryption or data loss prevention.
Securing Apps Critical to Advancing mHealth
What started with a wave of fitness tracking tools has rapidly evolved into an active marketplace of smartphone apps and add-ons, networked personal health devices, Big Data analytics, and transformative healthcare delivery models.
Top 5 “Anti-Resolutions” to Fix Cyber-security in 2016
To move forward in a healthier direction, I’ve identified five common approaches organizations should avoid for a more productive 2016.
Trust Who You Are Online With
The basic problem is that the internet was built, famously, without an identity layer. That is, its design includes no way for anyone to know with certainty what or which whom they are connecting.
Suffering Security Lag?
The recent spate of security incidents provides timely evidence that our adoption of technology appears to be outstripping our ability to protect it.
DMARC Specification Poised to Take Webmail Woes by Storm in 2016
The DMARC specification has been developed for web-based mail, which makes it virtually impossible for attackers to spoof, or fake, emails from a protected domain.
TalkTalk: the British Entry for Breach of the Year 2015
Everything’s always ‘bigger and better’ in the US, or at least that’s what they say. Unfortunately for federal employees and American consumers, this also means data breaches that have hit tens of millions over the past year.