Infosecurity Opinions
Comment: Securing BYOD is More Than a One-step Process
BYOD is no longer a trend, it’s a reality says Frank Andrus of Bradford Networks. Here he explains why implementing BYOD securely requires a comprehensive blueprint, and cannot be done through a single technology solution
Comment: The Missing Link from DLP
Solutions to prevent data loss need to involve the data owners themselves, so they can take appropriate actions to remediate risks before data is leaked. Traditional DLP technologies alone cannot achieve your security and governance goals, says David Gibson of Varonis
Comment: Avoid the Inherent Risks of Consumer Gadgets and Email
Consumer gadgets and corporate email can be a risk to information; John Thielens of Axway looks at how this can be avoided without banning consumer devices altogether
Comment: It’s Not about Network Security, It’s about Business Security
Gidi Cohen of Skybox Security explores the challenges information security executives face, and provides key steps they can take to tune their existing security infrastructure to be more effective and efficient
Comment: Defeating APT in the Cyber Trenches
Jim Butterworth of HBGary argues that instead of building bigger digital walls to secure their organizations, CSO’s must instead build resilience by combating advanced persistent threats (APTs) where they least expect them – already firmly established inside the network
Comment: Mobility Goes Mainstream
Infosecurity welcomes Patricia Titus, VP and CISO of Symantec, as the newest member of our Editorial Advisory Board. Titus tells us why following security best practices is the key to a successful mobility strategy
Protecting Distributed Network Infrastructure Availability across a Cloud-Connected Workforce
Robert Waldie of Opengear looks at three strategies learned in the data center to secure distributed sites against breach-of-availability incidents
Comment: Turn to Military-grade Security
Key industrial infrastructure is becoming as vulnerable as corporate data to attack, driving commercial organizations toward defense-grade IT solutions for protection. Arun Subbarao of LynuxWorks explains the wisdom behind the strategy
Comment: Do You Know Where Your Data Is?
As businesses increasingly bring in mobile devices for their staff, data can no longer be pinpointed to the. Siân John of Symantec discusses the threats to businesses and how employing data encryption on mobile devices brings a new level of security to sensitive business information
Comment: Taking the Ethical High Road
Marcus Ranum of Tenable Network Security outlines how the IT security industry can ensure its integrity by maintaining a strong code of ethics
Comment: Visibility Is an Essential Component to Data Governance
Addressing the volume of organizational data requires a balanced approach, which includes locating and identifying data by category. This visibility is the first step in identifying risk, says Gerard Curtin of PixAlert
Comment: Flow-based Monitoring Provides Security for the BYOD Environment
Lancope’s Joe Yeager discusses the benefits of leveraging flow-based data collection and analysis for mobile device security in BYOD environments
Comment: BYOD…But Keep the Data in the Office
KPMG CIO Advisory’s Martin Lunt believes BYOD has significant benefits for organizations, providing clear security policies are in place from the start
Comment: You Are the Weakest Link – In the Data Protection Chain
Information is the lifeblood of any organization, and in today’s world, we must ensure it is properly protected. There are a multitude of technological methods to secure our information, but any chain is only as strong as its weakest link says Richard Hall of CS Risk Management
Easily Enhancing the Security of Mobile Devices
ISACA advisor John P. Pironti outlines five easy steps that will promote more secure use of mobile devices
Comment: Under BYOD Pressure
Feeling pressure to implement a BYOD strategy? Start getting ready now, because BYOD is inevitable. But don’t pull the trigger on that shiny new miracle solution before you’ve covered the basics and know that it is right for you says Rory Higgins of Mancala Networks
Comment: The EU, Cloud Computing and Security
HP’s Prescott Winter gives his perspective regarding developments in cloud computing and security within the European Union
Comment: Yes to Privacy, and Yes to Internet Surveillance
By comparing protective measures in the real world with cyberspace protection, Tim Watson of De Montfort University discusses privacy versus security and the new internet surveillance powers proposed by the UK government. Watson argues that both privacy and security could be enhanced by increasing internet surveillance
Comment: Rebalancing the Security Portfolio
Are security budgets addicted to anti-virus at the expense of more immediate and emerging threats? Imperva’s Rob Rachwald explains why its time to shift the focus
Comment: Botnets – The Dark Side of Cloud Computing
Botnets pose a serious threat to your network, your business, your partners and your customers. Botnets rival the power of today’s most powerful cloud computing platforms, but these “dark” clouds are controlled by cybercriminals. Angelo Comazzetto at Sophos discusses the risks of botnet infection, and how businesses can protect themselves