Infosecurity Opinions

  1. Comment: Why Cybercriminals Love WiFi

    AirTight Network’s Ajay Kumar Gupta says it’s no coincidence that cybercriminals like to use WiFi connections. Here he provides an overview of the reasons why, and what can be done to prevent them from using your wireless network as an accomplice.

  2. Comment: Navigating the POS security standard minefield

    Steve Brunswick and Jose Diaz from Thales outline the payment security standards landscape and explain how these various standards fit together when securing data at the point of sale

  3. Comment: IT security tips from the Eagles

    From ‘Hotel California’ to ‘Lyin’ Eyes’, songs by the rock legends have useful infosecurity lessons for enterprises. Nick Lowe, Check Point’s head of sales for Western Europe, shows you the signs

  4. Comment: Raising the security standard

    Idappcom CEO Ray Bryant discusses how to step up your security defenses by measuring current effectiveness and enhancing your security solutions.

  5. Comment: Don’t fear the cloud, or its security

    Take your head out of the cloud and get real says John Colley, managing director of (ISC)² EMEA

  6. Comment: A logical shortfall for the ‘complete CSO’

    Meridian’s Paul Johnson examines the differences between CSO and CISO and makes the case as to why small and medium-sized organizations must consider logical security training if they choose to employ an all-encompassing CSO, rather than separating logical security responsibilities out to a CISO.

  7. Comment: Are we really securing virtualisation or just virtualising security?

    Should organisations buy into new offerings to secure virtual environments, or simply opt to reconfigure their current security products to suit their needs? COMPUTERLINKS’ Rupert Collier examines this question while attempting to plough through all the vendor fluff

  8. Comment: The value of PCI DSS compliance

    LAN2LAN’s Gary Duke examines how enhanced PCI data security can protect the lifeblood of your business

  9. Comment: Rogue Access Point Setups on Corporate Networks

    The latest in a series of wireless security articles from AirTight Networks’ Ajay Kumar Gupta examines rouge access point scenarios that could affect corporate networks (or any network for that matter).

  10. Comment: Police pledge to protect our data

    Blue Cube Security's Gary Haycock-West provides tips that public sector organisations, such as police forces, can employ to facilitate secure access to data using mobile devices.

  11. Comment: Automated security analysis – learning to love change

    Change is the only constant in security – new users, new apps, growing networks and new threats mean recurring headaches for security teams. So how can IT stay ahead of change when everything is in flux? Gidi Cohen of Skybox Security shows how

  12. Comment: Anti-Malware Automation Tools Save Time and Money

    IT budgets continue to be squeezed while malware challenges become more formidable each day. Matt Allen of Norman Data Defense Systems discusses how sandboxing technologies can deliver on cost-effectiveness and timeliness claims by doing high-volume malware analysis in a safe environment.

  13. Comment: Avoiding and recovering from nasty network configuration mistakes

    Network mistakes constantly happen throughout the day and are the bane of the network manager. Reuven Harrison, CTO of Tufin Technologies, provides some excellent hints and tips for network managers

  14. Comment: A new generation will demand a change in the role of security

    Redstone’s Martin Blackhurst examines the effects that future employees from the “Facebook generation” will have on maintaining IT security.

  15. Comment: SaaS Offerings for Wireless PCI Compliance

    The first PCI DSS compliance deadline is approaching in September, and with that comes the ever-growing concerns over protecting payment card information transmitted over wireless connections. Ajay Kumar Gupta of AirTight Networks discusses the various SaaS offerings that allow small and medium-sized business to achieve compliance while improving WiFi security.

  16. Comment: Context-aware security in VDI implementations

    Bob Janssen of RES Software examines how secure desktop virtualization can be achieved using a context-centric approach

  17. Comment: Black Swans, Secure Access and Business Continuity

    How can businesses deliver flexible, scalable and secure remote access to staff during contingencies, while controlling costs? Check Point’s Nick Lowe describes a new approach to the problem

  18. Comment: Protect our data – set it free

    Privacy is a two way street – we need to free data as well as protect it says Jonathan Raper, professor of information science at City University London. Read his thoughts on why the new UK government needs to implement what he calls a “digital social contract”.

  19. Comment: PCI DSS compliance in the cloud

    With the PCI DSS compliance deadline rapidly approaching, Star’s Hugo Harber examines the issues card processors must address to maintain compliance when storing data on hosted cloud services

  20. Comment: Can smartphone applications help terrorists communicate without detection?

    Duncan Pauly of CopperEye explains how IP technologies may be providing new ways for terrorist activity to go unnoticed

What’s hot on Infosecurity Magazine?