Infosecurity News Features
CREST Workshop Gathers to Tackle Gender Gap in InfoSec
It’s no secret that women have been overwhelmingly underrepresented in the cybersecurity industry for a number of years
#Oktane16: Journalist Brian Krebs on Cyber-attacks, Authentication and Authorization
Renowned investigative journalist Brian Krebs took to the stage this week at Oktane16 to discuss all things cybersecurity
Almost a Third of Staff Still Fall for Phishing Emails
Research from Duo Security's Duo Insight phishing tool found 31% of staff clicked the link in emails sent by their internal team
How to be a Successful Next-Gen CISO: A Panel Discussion – Part Two
At Infosecurity Europe 2016 an impressive panel of industry security leaders sat down to discuss the evolving role of the CISO.
How to be a Successful Next-Gen CISO: A Panel Discussion – Part One
At Infosecurity Europe 2016 an impressive panel of industry security leaders sat down to discuss the evolving role of the CISO.
We’re Vulnerable to Attack, Say 89% of UK Organizations
Companies planning to invest in security in the next 12 months are running the risk of doing so in the wrong areas, says Vormetric.
Harsh Lessons Learned by Linkedin
A 2012 breach of LinkedIn user data was believed to have contained “close to 6.5 million unsalted password hashes” and for this writer, it taught me a lot about salting and hashing as LinkedIn raced to fix the issue.
Human Error Considered Biggest Security Threat to Orgs, New Study Finds
NODE4's study examines the attitudes and precautions adopted by ITDMs regarding the cyber threat landscape.
Microsoft Using Machine Learning to Strengthen Security
Microsoft has released the newest version of its Security Intelligence Report which analyzes the threat landscape of exploits and vulnerabilities the industry faced in the second half of 2015.
Techniques of Cyber-Criminals Continue to Evolve
New report reveals that cyber-criminals have adopted an organizational shift in how they carry out their attacks.
San Bernardino Case May be Over, but Gov Access Issue Will Not Go Away
The US government has found its own way into the iPhone of San Bernardino gunmen Syed Farook, dropping 'backdoor' demand
Will the £35K Rule Hit the Security Industry?
As of 6 April 2016, skilled workers in the UK on Tier 2 visas (sponsored 'work permits') will only be able to secure Indefinite Leave to Remain in the UK if they are earning at least £35,000 per year.
CRESTCon & IISP Congress 2016: What Role Do Ethics Play in Security?
Toby Stevens, Director of Enterprise Privacy Group, discusses the role that ethics play in privacy and the importance for security professionals to act and work ‘ethically’.
How to DCEPT your Attackers
A look at the “open source honeytoken tripwire” DCEPT from Dell Secureworks
Australian Orgs Will Struggle with Data Breach Bill
Consulting firm Protiviti has predicted Australian companies will face confusion when complying with the Federal Government’s mandatory data breach notification proposals
#RSAC: CSI:Cyber Panel Aims to Please Critics
Despite CSI:Cyber receiving unpopular reviews from the security community, it has been renewed for a second series and this week at RSA Conference in San Francisco, two members of the cast and its creator took centre stage in the keynote theater.
Ransomware: Prevention vs Cure
Can a focus on vigilance prevent cyber extortion, or is prioritizing a strong recovery plan the way forward?
#RSAC: Innovation Sandbox Presents Ten of the Best
The ‘Innovation Sandbox’, the process sees vendors enter and be reduced down to a final ten, who get the pleasure of presenting three minute pitches to a panel of judges
TEISS: Cybersecurity Can Learn from International Crisis Management
The cyber industry can take lessons from the wider spectrum of crisis management and response, such as the aftermath of natural disasters and worldwide epidemics
Do CIOs Underestimate Cyber Breach Recovery?
Report by Carbon Black finds 28% of UK CIOs are ‘not concerned’ by data breach remediation