Infosecurity Opinions
Getting the Right Balance between Employee Enablement and Control
Russell Miller, former ethical hacker and current director in identity and access management at CA Technologies explores why protecting against insider threats is often a big challenge for organizations
Cybersecurity and the CFO: What Your Organization Needs to Know
The CFO’s role in an organization’s security operation is vital, and it’s crucial that companies recognize this, writes Steve Durbin
How to Mitigate the Security Risks Associated with the Public Cloud
Cost savings and convenience make cloud computing attractive to organizations – but there are a number of security priorities to consider, says Amit Cohen
Macs are Safer than PCs, Right?
Rick Delgado looks at the age-old fallacy that Macs are somehow invulnerable to attack
The UK Government Must Act Now on Cyber-Threats
Ash J. Hunt believes that the government is lagging behind in its policy and strategy regarding cyber-threats, and must act now
Looking Beyond the Biometrics Hype
Problems with biometric authentication mean it is far from a fool-proof security solution, argues Silvio Kutic
What the Citadel Can Teach Us about Computer Security
It’s time to turn the permissive computing model on its head, writes Brian Maccaba
Infosec and the Blame Game
Peter Berlich explores the challenge of keeping your professional integrity in an organization with a culture of blame
A Hybrid Approach: Rewriting the Rules for DDoS Defense
Dave Larson discusses why and how organizations should take a hybrid approach to DDoS protection
Big Data Poses Many Data Protection Questions
More and more companies now say that they are using or looking to use big data analytics in their business. But the concept of big data raises a number of issues for data protection and data security, says Paul Glass
Why Your Data May Need a Passport
The actual physical location of data is no longer cut and dry, as electronic forms of information and in particular, the cloud, have changed the entire IT landscape, says David Cannellos
Employees are the Missing Piece of the Security Puzzle
Security policies will not be successful without employee compliance, but almost a quarter of employees believe security is not their responsibility. Fordway’s Richard Blanford advises organizations to develop realistic security policies to encourage employee buy-in and use solutions such as DLP and single sign-on
Dealing with the Stress of an Infosec Job
IT security managers are pressured by the many demands of a job that requires them to deal with unpredictable technical issues, systems threats, administrative tasks, strict deadlines and certification requirements. Stress cannot be prevented – but it can be minimized with pre-planning and good communication, says Daniel Brecht
Data Protection Starts with Everyone
You and your co-workers are the final frontier in an organization’s breach defenses, writes Roy Peretz
2015 State of the Union Address: The Implications
The current proposals are the equivalent of putting up more security cameras instead of buying a better safe, says Bill Solms
Security Audit Policy is Essential in Ensuring Network Security
Failing an audit in an industry with tight regulatory compliance could have serious consequences – so make sure you’re on the ball, says Rupesh Kumar
Tackling A False Sense of Device Security
Vince Mazza addresses users’ security misconceptions surrounding smart devices – regardless of brand, he says, consumers need to be more vigilant when it comes to protecting their personal data
The SOC Lone Ranger: Achieving More with Less
Working around lack of security budget and resources doesn’t have to be so bad, argues Joe Schreiber
How to Reward Performance for Security Professionals
Senior roles in corporations frequently come with performance-based pay schemes attached. Security professionals should put professionalism first and not aim to please for the sake of a reward, says Peter Berlich
Why ‘Zero Trust’ Might be the Best Approach for Your Organization
François Amigorena takes a brief look at the core issues behind an ever increasing landscape of IT security breaches and makes the case for ‘zero trust’