Infosecurity Opinions
Comment: Sharing may cut costs, but IT security can’t be forgotten
Whatever the method, reducing IT costs through sharing of resources should not be at the expense of security according to Steve Jenkins of Q1 Labs
Comment: Keeping Your Organization Safe from the WikiLeaks Phenomenon
The WikiLeaks saga is causing many CISOs to wonder whether their organization is at risk from insiders who wish to embarrass their employer by leaking sensitive information. This has prompted Gord Boyce, CEO of ForeScout, to ask: What can be done to stop a determined insider?
Comment: Defining a security blueprint for the enterprise
On 27 October, 2010, eleven key decision makers in information security and risk management gathered at London’s famous Gherkin for an enterprise security roundtable debate organised by independent IT consultancy, Glue Reply. The roundtable is a periodic event aimed at thought leaders with responsibilities in large enterprises. The aim of this debate was to explore how to build a real business case for enterprise security architecture and how to define a security blueprint to drive the future of information security and risk management within the enterprise.
Comment: ‘Tis the Season for Cyber Scamming
A great online sale can be ruined if hackers steal your credit card number. Nicholas J. Percoco, senior vice president and head of Trustwave’s SpiderLabs, shares data security best practices for safe e-commerce, such as looking for “trust” indicators like SSL certificates, and how to help prevent cyber theft now and through the New Year.
Comment: Is your data in the hacker's firing line?
We all put sensitive data into files that enables us to access the information we need quickly. Within the public sector, there is even more sensitive data – from patient records, benefit details to draft government policies. Raphael Reich of Imperva looks at the wealth of sensitive data within the public sector stored in widely accessible files, the value of this information and why these files must be secured to ensure it doesn’t get into the wrong hands
Comment: Managing Cybercrime
Matthijs van der Wel from Verizon Business Security Solutions discusses the emerging threats from cybercriminals and how businesses can manage cybercrime in 2011.
Comment: Cybersecurity – a new threat or just a new image?
What is the message coming out of the UK Government regarding information security? The Comprehensive Spending Review along with the Strategic Defence and Security Review have both identified the cyber threat as a significant risk. Nathan Fowler, director of QT&C Ltd, has been looking at the budget allocation behind the drive for increased cybersecurity and what this means for the rest of the industry
Comment: Tips for private key management
Paul Turner of Venafi explains why the management of both private keys and certificates is central to the security of all data, and why automation of the key processes will keep your organization secure.
Where on Earth is MARS?
Ever wonder what happened to Cisco’s MARS security information event management (SIEM) solution? Cisco pushed MARS as an essential piece of the network security puzzle, only to leave the product on the curb for collection a few years later. Contrary to popular belief, there is some life in MARS, and its name is AccelOps.
Comment: Privacy Laws Must Change with the Times
When they return from the mid-term elections, Congress will begin a legislative effort to update consumer privacy protection without hindering technological advancements. A leading IT Industry trade association weighs in on what is needed for new online privacy standards.
Comment: Web 2.0 – Friend or foe?
Check Point's Nick Lowe discusses how organisations can become an Employer 2.0 and explains why educating users in what is appropriate is as important as the solutions themselves.
Comment: How much is your email address worth?
Amichai Shulman, CTO of Imperva, discusses the black market value of our online credentials and how criminals turn them into cash
Comment: How ZeuS Became the King of Financial Malware
In this article, noted internet security researcher Amit Klein, CTO of secure browsing vendor Trusteer, explains how the ZeuS financial trojan has risen to the top of the criminal malware heap, and why it is the preferred crimeware platform for committing online fraud.
Comment: How to Make Social Media Safe and Secure
Social media is sometimes regarded as a double-edged sword. Clearswift’s VP of Americas, Bob Pritchard, explains how businesses can make social media a useful business weapon without opening themselves up to the potential dangers of the web’s fastest-growing opportunity.
Comment: The cloud – As secure as a password
Neil Hollister, CEO of CRYPTOCard, argues that businesses’ move toward cloud-based computing has to go hand-in-hand with a review of security procedures
Comment: How to cut costs and still remain secure
Bob Heard, CEO and co-founder of Credant Technologies, offers advice on keeping data secure even when your budgets have been slashed
Comment: How secure are your passwords?
Today we all spend more and more time online, and passwords are the key to our online identity. So it’s no surprise that cybercriminals want to steal our passwords as part of online identity theft. Kaspersky Lab’s David Emm offers some tips for creating online passwords and staying safe online.
Comment: Connecting the dots on insider fraud
Matthew O’Kane, head of Financial Services Analytics at Detica, discusses how organizations can detect employees disclosing customer data and using it for their own personal gain without restricting them from doing their day-to-day jobs
Comment: When WiFi WarDriving Turns into ‘WarDiving’
Hemant Chaskar of AirTight Networks discusses how hackers can penetrate, or dive. into enterprise networks using WiFi vulnerabilities discovered through WarDriving and the remedies possible to defend from such attacks.
Comment: Intel and McAfee – What Next for Security?
There has been a lot of speculation about the rationale behind Intel's recent acquisition of McAfee and what the deal means for the security market. Trend Micro's Rik Ferguson shares his take on the acquisition looking at some of the wider implications and developments of chip- and cloud-based technologies.