Infosecurity Opinions

  1. Comment: Combating cyber crime with protective monitoring

    Ross Brewer of LogRhythm explains how compliance with protective monitoring guidelines in the Good Practice Guide (GPG) 13 should be the foundation of all good security information event management (SIEM) policies

  2. Comment: Simplifying Data Loss Prevention

    Without the right approach, all of the promised advantages of today’s data loss prevention (DLP) products may not be realized says Jared Thorkelson of DLP Experts.

  3. Comment: Is there a skills gap in infosecurity, or just a lack of engagement?

    Sophos’ James Lyne says initiatives like the UK Cyber Security Challenge could provide part of the answer.

  4. Comment: The Future of Smartphone Security

    Daniel Burrus, founder and CEO of Burrus Research, outlines the future of smartphone security, including insight into how smartphone apps will affect the information security industry

  5. Comment: Is the US Next to Implement Chip and PIN?

    Jose Diaz of Thales e-Security discusses the potential migration to Chip and PIN in the US. Diaz explains how this transition could improve security of our payments infrastructure.

  6. Comment: Watch out – cybercriminals are about

    It’s a dangerous online world, and you need to stay alert if you want to keep safe from scammers hell bent on stealing your credentials. Amit Klein, CTO of Trusteer, looks at the tactics cybercriminals are using to dupe us into revealing more than we intend to, and gives seven defences to help keep our guards up.

  7. Comment: Extreme data protection in virtualised environments

    Peter Eicher of Syncsort draws from his 16 years of software industry experience to outline five data protection imperatives that organisations should consider during virtual server planning.

  8. Comment: Extreme Data Protection in Virtualized Environments

    Peter Eicher of Syncsort draws from his 16 years of software industry experience to outline five data protection imperatives that organizations should consider during virtual server planning.

  9. Comment: Securing data-at-rest with self-encrypting drives

    In order for data centres to guarantee the security of their most valuable asset – that is, data – they must identify critical control points where data is at its most vulnerable. One of these critical control points is when data is at rest, particularly data stored on hardware and storage devices. Bret Weber, chief architect at storage and networking provider LSI, that looks at how data centres can utilise self-encrypting hard drives to protect data-at-rest.

  10. Comment: Working with third-party suppliers

    Recent legislation has granted the Information Commissioner’s Office (ICO) the authority to issue hefty fines for the mislaying or misuse of sensitive student information. Chris Jones, CEO of PageOne, outlines the steps educational institutions should take when working with third-party suppliers to avoid serious penalties and ensure sensitive data is protected.

  11. Comment: Why Cybercriminals Love WiFi

    AirTight Network’s Ajay Kumar Gupta says it’s no coincidence that cybercriminals like to use WiFi connections. Here he provides an overview of the reasons why, and what can be done to prevent them from using your wireless network as an accomplice.

  12. Comment: Navigating the POS security standard minefield

    Steve Brunswick and Jose Diaz from Thales outline the payment security standards landscape and explain how these various standards fit together when securing data at the point of sale

  13. Comment: IT security tips from the Eagles

    From ‘Hotel California’ to ‘Lyin’ Eyes’, songs by the rock legends have useful infosecurity lessons for enterprises. Nick Lowe, Check Point’s head of sales for Western Europe, shows you the signs

  14. Comment: Raising the security standard

    Idappcom CEO Ray Bryant discusses how to step up your security defenses by measuring current effectiveness and enhancing your security solutions.

  15. Comment: Don’t fear the cloud, or its security

    Take your head out of the cloud and get real says John Colley, managing director of (ISC)² EMEA

  16. Comment: A logical shortfall for the ‘complete CSO’

    Meridian’s Paul Johnson examines the differences between CSO and CISO and makes the case as to why small and medium-sized organizations must consider logical security training if they choose to employ an all-encompassing CSO, rather than separating logical security responsibilities out to a CISO.

  17. Comment: Are we really securing virtualisation or just virtualising security?

    Should organisations buy into new offerings to secure virtual environments, or simply opt to reconfigure their current security products to suit their needs? COMPUTERLINKS’ Rupert Collier examines this question while attempting to plough through all the vendor fluff

  18. Comment: The value of PCI DSS compliance

    LAN2LAN’s Gary Duke examines how enhanced PCI data security can protect the lifeblood of your business

  19. Comment: Rogue Access Point Setups on Corporate Networks

    The latest in a series of wireless security articles from AirTight Networks’ Ajay Kumar Gupta examines rouge access point scenarios that could affect corporate networks (or any network for that matter).

  20. Comment: Police pledge to protect our data

    Blue Cube Security's Gary Haycock-West provides tips that public sector organisations, such as police forces, can employ to facilitate secure access to data using mobile devices.

What’s hot on Infosecurity Magazine?