Infosecurity Opinions

  1. Comment: War and Rumors of War in Cyberspace

    Craig Robinson, chief operating officer of GlobalSCAPE, argues that cyberspace has become a contested battlefield with long-term implications. Robinson discusses the potential for cybersecurity practitioners to learn from traditional defense practices, especially in defining durable policies and strategies for operating in the cyber domain.

  2. Comment: The do’s and don’ts of data classification

    Data classification is often referred to as something of a black art in the field of IT risk management as Sean Glynn, VP product development with Credant Technologies, explains…

  3. Comment: Some Documents Require Fine-Grained, Dynamic Security

    Knowledge workers are increasingly using their abilities to discover patterns where none were previously known: to find connections across disparate sources of data, or to identify suspicious behavior on the basis of anomalies in data streams. Open, flexible access to documents is essential for this process, and there is no way back to a world of siloed information. But, as IBM’s Joshua Fox examines, this very openness increases the risk of exposing sensitive data about an organization or its customers.

  4. Comment: Security breaches cost health care industry £4bn annually

    By adopting a secure file transfer solution and abandoning risky file-sharing practices, an organization can better protect its confidential data and simplify compliance with industry regulations and data-security laws, says Paul Steiner, managing director, Accellion EMEA

  5. Comment: Reducing Document Security Risks without Raising User Resistance

    Recent high-profile leaks have served as a wake-up call to CISOs worried about whether their sensitive documents could be at risk of intentional or accidental disclosure. But forcing unwieldy policies on employees can be disruptive. Dr. Claudia Böttcher of Brainloop says the answer lies in adopting methods that make document security transparent, or second nature.

  6. Comment: The state of encryption

    Dave Everitt, general manager EMEA at Absolute Software, examines the potential problems with relying on encryption for data security, and puts forward the case for a layered approach to safeguarding information.

  7. Comment: Security Secrets Your IT Administrators Don't Want You to Know

    Philip Lieberman, CEO of Lieberman Software and well-known cybersecurity expert, gives insight into what's lacking in most organizations' identity management, password, access and auditing policies.

  8. Comment: Will High-Speed Malware Crash the Internet?

    Napatech’s Daniel Joseph Barry looks at what the challenges are, and what can be done, to avert the economic impact of an internet collapse.

  9. Comment: Security must emerge from the shadows

    Andrew Wyatt, chief operating officer at software security firm Clearswift, explains why overhauling outdated ‘stop-and-block’ attitudes to security is vital in today’s business environment, and how bringing IT security out of the shadows within an organisation can reap rewards

  10. Comment: Rewards for Hacking – Good, Bad or Ugly?

    If a hacker finds a flaw in your program, then the bounty paid out might not be enough. Anthony Haywood of Idappcom gives his thoughts on the bug bounty trend

  11. Comment: Sharing may cut costs, but IT security can’t be forgotten

    Whatever the method, reducing IT costs through sharing of resources should not be at the expense of security according to Steve Jenkins of Q1 Labs

  12. Comment: Keeping Your Organization Safe from the WikiLeaks Phenomenon

    The WikiLeaks saga is causing many CISOs to wonder whether their organization is at risk from insiders who wish to embarrass their employer by leaking sensitive information. This has prompted Gord Boyce, CEO of ForeScout, to ask: What can be done to stop a determined insider?

  13. Comment: Defining a security blueprint for the enterprise

    On 27 October, 2010, eleven key decision makers in information security and risk management gathered at London’s famous Gherkin for an enterprise security roundtable debate organised by independent IT consultancy, Glue Reply. The roundtable is a periodic event aimed at thought leaders with responsibilities in large enterprises. The aim of this debate was to explore how to build a real business case for enterprise security architecture and how to define a security blueprint to drive the future of information security and risk management within the enterprise.

  14. Comment: ‘Tis the Season for Cyber Scamming

    A great online sale can be ruined if hackers steal your credit card number. Nicholas J. Percoco, senior vice president and head of Trustwave’s SpiderLabs, shares data security best practices for safe e-commerce, such as looking for “trust” indicators like SSL certificates, and how to help prevent cyber theft now and through the New Year.

  15. Comment: Is your data in the hacker's firing line?

    We all put sensitive data into files that enables us to access the information we need quickly. Within the public sector, there is even more sensitive data – from patient records, benefit details to draft government policies. Raphael Reich of Imperva looks at the wealth of sensitive data within the public sector stored in widely accessible files, the value of this information and why these files must be secured to ensure it doesn’t get into the wrong hands

  16. Comment: Managing Cybercrime

    Matthijs van der Wel from Verizon Business Security Solutions discusses the emerging threats from cybercriminals and how businesses can manage cybercrime in 2011.

  17. Comment: Cybersecurity – a new threat or just a new image?

    What is the message coming out of the UK Government regarding information security? The Comprehensive Spending Review along with the Strategic Defence and Security Review have both identified the cyber threat as a significant risk. Nathan Fowler, director of QT&C Ltd, has been looking at the budget allocation behind the drive for increased cybersecurity and what this means for the rest of the industry

  18. Comment: Tips for private key management

    Paul Turner of Venafi explains why the management of both private keys and certificates is central to the security of all data, and why automation of the key processes will keep your organization secure.

  19. Where on Earth is MARS?

    Ever wonder what happened to Cisco’s MARS security information event management (SIEM) solution? Cisco pushed MARS as an essential piece of the network security puzzle, only to leave the product on the curb for collection a few years later. Contrary to popular belief, there is some life in MARS, and its name is AccelOps.

  20. Comment: Privacy Laws Must Change with the Times

    When they return from the mid-term elections, Congress will begin a legislative effort to update consumer privacy protection without hindering technological advancements. A leading IT Industry trade association weighs in on what is needed for new online privacy standards.

What’s hot on Infosecurity Magazine?