Infosecurity Opinions

  1. Comment: Web 2.0 – Friend or foe?

    Check Point's Nick Lowe discusses how organisations can become an Employer 2.0 and explains why educating users in what is appropriate is as important as the solutions themselves.

  2. Comment: How much is your email address worth?

    Amichai Shulman, CTO of Imperva, discusses the black market value of our online credentials and how criminals turn them into cash

  3. Comment: How ZeuS Became the King of Financial Malware

    In this article, noted internet security researcher Amit Klein, CTO of secure browsing vendor Trusteer, explains how the ZeuS financial trojan has risen to the top of the criminal malware heap, and why it is the preferred crimeware platform for committing online fraud.

  4. Comment: How to Make Social Media Safe and Secure

    Social media is sometimes regarded as a double-edged sword. Clearswift’s VP of Americas, Bob Pritchard, explains how businesses can make social media a useful business weapon without opening themselves up to the potential dangers of the web’s fastest-growing opportunity.

  5. Comment: The cloud – As secure as a password

    Neil Hollister, CEO of CRYPTOCard, argues that businesses’ move toward cloud-based computing has to go hand-in-hand with a review of security procedures

  6. Comment: How to cut costs and still remain secure

    Bob Heard, CEO and co-founder of Credant Technologies, offers advice on keeping data secure even when your budgets have been slashed

  7. Comment: How secure are your passwords?

    Today we all spend more and more time online, and passwords are the key to our online identity. So it’s no surprise that cybercriminals want to steal our passwords as part of online identity theft. Kaspersky Lab’s David Emm offers some tips for creating online passwords and staying safe online.

  8. Comment: Connecting the dots on insider fraud

    Matthew O’Kane, head of Financial Services Analytics at Detica, discusses how organizations can detect employees disclosing customer data and using it for their own personal gain without restricting them from doing their day-to-day jobs

  9. Comment: When WiFi WarDriving Turns into ‘WarDiving’

    Hemant Chaskar of AirTight Networks discusses how hackers can penetrate, or dive. into enterprise networks using WiFi vulnerabilities discovered through WarDriving and the remedies possible to defend from such attacks.

  10. Comment: Intel and McAfee – What Next for Security?

    There has been a lot of speculation about the rationale behind Intel's recent acquisition of McAfee and what the deal means for the security market. Trend Micro's Rik Ferguson shares his take on the acquisition looking at some of the wider implications and developments of chip- and cloud-based technologies.

  11. Comment: Combating cyber crime with protective monitoring

    Ross Brewer of LogRhythm explains how compliance with protective monitoring guidelines in the Good Practice Guide (GPG) 13 should be the foundation of all good security information event management (SIEM) policies

  12. Comment: Simplifying Data Loss Prevention

    Without the right approach, all of the promised advantages of today’s data loss prevention (DLP) products may not be realized says Jared Thorkelson of DLP Experts.

  13. Comment: Is there a skills gap in infosecurity, or just a lack of engagement?

    Sophos’ James Lyne says initiatives like the UK Cyber Security Challenge could provide part of the answer.

  14. Comment: The Future of Smartphone Security

    Daniel Burrus, founder and CEO of Burrus Research, outlines the future of smartphone security, including insight into how smartphone apps will affect the information security industry

  15. Comment: Is the US Next to Implement Chip and PIN?

    Jose Diaz of Thales e-Security discusses the potential migration to Chip and PIN in the US. Diaz explains how this transition could improve security of our payments infrastructure.

  16. Comment: Watch out – cybercriminals are about

    It’s a dangerous online world, and you need to stay alert if you want to keep safe from scammers hell bent on stealing your credentials. Amit Klein, CTO of Trusteer, looks at the tactics cybercriminals are using to dupe us into revealing more than we intend to, and gives seven defences to help keep our guards up.

  17. Comment: Extreme data protection in virtualised environments

    Peter Eicher of Syncsort draws from his 16 years of software industry experience to outline five data protection imperatives that organisations should consider during virtual server planning.

  18. Comment: Extreme Data Protection in Virtualized Environments

    Peter Eicher of Syncsort draws from his 16 years of software industry experience to outline five data protection imperatives that organizations should consider during virtual server planning.

  19. Comment: Securing data-at-rest with self-encrypting drives

    In order for data centres to guarantee the security of their most valuable asset – that is, data – they must identify critical control points where data is at its most vulnerable. One of these critical control points is when data is at rest, particularly data stored on hardware and storage devices. Bret Weber, chief architect at storage and networking provider LSI, that looks at how data centres can utilise self-encrypting hard drives to protect data-at-rest.

  20. Comment: Working with third-party suppliers

    Recent legislation has granted the Information Commissioner’s Office (ICO) the authority to issue hefty fines for the mislaying or misuse of sensitive student information. Chris Jones, CEO of PageOne, outlines the steps educational institutions should take when working with third-party suppliers to avoid serious penalties and ensure sensitive data is protected.

What’s hot on Infosecurity Magazine?