Infosecurity News Features
Identifying the Problem of Disruption
Why do so many disruptions occur outside of the organization’s network control and why are they hard to monitor and identify?
All At Sea
Cables run between continents, channelling terabits of information down a single fibre-optic link. They are incredibly expensive to build, with a transatlantic link costing around $500 million, and only a handful of firms have the ability to lay them.
#WIREDSecurity: The Best Bits
WIRED Magazine recently held it's first WIRED Security Conference in London. Here are our highlights from the day
CREST Workshop Gathers to Tackle Gender Gap in InfoSec
It’s no secret that women have been overwhelmingly underrepresented in the cybersecurity industry for a number of years
#Oktane16: Journalist Brian Krebs on Cyber-attacks, Authentication and Authorization
Renowned investigative journalist Brian Krebs took to the stage this week at Oktane16 to discuss all things cybersecurity
Almost a Third of Staff Still Fall for Phishing Emails
Research from Duo Security's Duo Insight phishing tool found 31% of staff clicked the link in emails sent by their internal team
How to be a Successful Next-Gen CISO: A Panel Discussion – Part Two
At Infosecurity Europe 2016 an impressive panel of industry security leaders sat down to discuss the evolving role of the CISO.
How to be a Successful Next-Gen CISO: A Panel Discussion – Part One
At Infosecurity Europe 2016 an impressive panel of industry security leaders sat down to discuss the evolving role of the CISO.
We’re Vulnerable to Attack, Say 89% of UK Organizations
Companies planning to invest in security in the next 12 months are running the risk of doing so in the wrong areas, says Vormetric.
Harsh Lessons Learned by Linkedin
A 2012 breach of LinkedIn user data was believed to have contained “close to 6.5 million unsalted password hashes” and for this writer, it taught me a lot about salting and hashing as LinkedIn raced to fix the issue.
Human Error Considered Biggest Security Threat to Orgs, New Study Finds
NODE4's study examines the attitudes and precautions adopted by ITDMs regarding the cyber threat landscape.
Microsoft Using Machine Learning to Strengthen Security
Microsoft has released the newest version of its Security Intelligence Report which analyzes the threat landscape of exploits and vulnerabilities the industry faced in the second half of 2015.
Techniques of Cyber-Criminals Continue to Evolve
New report reveals that cyber-criminals have adopted an organizational shift in how they carry out their attacks.
San Bernardino Case May be Over, but Gov Access Issue Will Not Go Away
The US government has found its own way into the iPhone of San Bernardino gunmen Syed Farook, dropping 'backdoor' demand
Will the £35K Rule Hit the Security Industry?
As of 6 April 2016, skilled workers in the UK on Tier 2 visas (sponsored 'work permits') will only be able to secure Indefinite Leave to Remain in the UK if they are earning at least £35,000 per year.
CRESTCon & IISP Congress 2016: What Role Do Ethics Play in Security?
Toby Stevens, Director of Enterprise Privacy Group, discusses the role that ethics play in privacy and the importance for security professionals to act and work ‘ethically’.
How to DCEPT your Attackers
A look at the “open source honeytoken tripwire” DCEPT from Dell Secureworks
Australian Orgs Will Struggle with Data Breach Bill
Consulting firm Protiviti has predicted Australian companies will face confusion when complying with the Federal Government’s mandatory data breach notification proposals
#RSAC: CSI:Cyber Panel Aims to Please Critics
Despite CSI:Cyber receiving unpopular reviews from the security community, it has been renewed for a second series and this week at RSA Conference in San Francisco, two members of the cast and its creator took centre stage in the keynote theater.
Ransomware: Prevention vs Cure
Can a focus on vigilance prevent cyber extortion, or is prioritizing a strong recovery plan the way forward?