Infosecurity Opinions
Comment: IT security implications for the War on Terror
John Poulter of Informatica examines why IT security professionals in both the private and public sector are primary combatants in the global War on Terror. He explores options on aiding this process, and how to do so without ‘breaking the bank’
Comment: We need to address the silo mentality in infosecurity
Tony Dyhouse expresses his concern that the lack of information sharing among organizations will keep the information security community one step behind cybercriminals
Comment: Security doubts about the cloud
According to VASCO Data Security’s Jan Valcke, strong authentication can surmount end-users’ security concerns and prevents revenue loss for SaaS providers
Comment: Top reasons why corporate Wi-Fi clients connect to unauthorized networks
Ajay Kumar Gupta of AirTight Networks reviews some of the most common reasons why corporate Wi-Fi users connect to unauthorized networks and what can be done to combat the problem.
Comment: Maintaining data integrity for your organization
Simon Morris of Pentura debates the issue of data security and the importance of identity authentication when dealing with confidential and sensitive data.
Comment: Securing the mobile workforce and your company's data
Andy Cordial of Origin Storage provides tips for organizations seeking to secure data in a world where mobile tools are quickly becoming primary devices for employees.
Comment: With information security, you must regulate yourself
Morey Haber of eEye Digital Security believes that information security is a horizontal issue that we regulate vertically. Here he examines why this tactic is putting us all at risk.
Comment: Addressing identity and access management challenges in the retail sector
John Handelaar of Passlogix knows that one password is always easier to remember than two or three, but how can an organization both streamline access management processes while maintaining identity security for its customers?
Comment: Cybercrime - Still a growth industry?
One business most likely to be booming in the next year is that of cybercrime, says Charlie Abrahams of MarkMonitor
Comment: The magic triangle of information security
Senior IT security veteran Michael Oberlaender explains why availability, integrity, and confidentiality of information are all vital to an organization’s goals and reputation. He also examines the balancing act of security, costs, and functionality that must be evaluated by any IT security professional.
Comment: Securing web 2.0 in the workplace
Simon Morris, research and development director at Pentura looks at how the adoption of web 2.0 makes the job of keeping email and the web free from attacks, malware and spam even more difficult. Yet, simply closing access to unapproved tools can be short sighted as unhappy employees drift to rival businesses with more enlightened policies
Comment: Making protection against the impossible information security threats, possible
The information security industry is changing and as more and more crime is committed online, security software vendors will have no choice but to adjust. Kevin Hogan, director of Symantec’s response centre explains how it is leading the market in responding to this shift…
Comment: Exit strategy - How forensic ready are you?
Losing a key employee is never easy, but it can be harder still if they take confidential company information with them. Duncan Gardiner, director forensic services at Epiq Systems outlines the steps that companies can take to protect their positions, both before and after such an event.
Comment: How to stay mobile whilst keeping sensitive data safe
Press coverage is, on the whole, to be welcomed; however negative publicity hurts your brand and image and does not help win hearts, minds and new customers. So why do so many companies actively court this by being so poor when it comes to handling sensitive data?
Comment: Thoughts from a security researcher on Conficker
Patrick Runald, senior threat research manager at Websense Security Labs shares his thoughts on Conficker as the worm reaches its first anniversary of appearing in the wild.
Comment: USB sticks - An employees dream- IT’s worst nightmare
Ironkey's John Jefferis explores the benefits, but also the information security issues surrounding USB sticks.
Comment: The smart way to safer hospitals
Over the past few years, the healthcare sector has become increasingly dependent on information technology. Contactless smart card technology has been used many years in other industries, and is now helping to solve some longstanding thorny issues in the healthcare sector: safeguarding patients and staff and protecting confidential patient information.
Comment: Facilities managers taking on security
Facilities and risk managers are feeling the knock-on effect of the economic climate by having more responsibility placed upon their shoulders; security provision being one. Steve Garton, director at Advent IM, outlines security issues facing these workers.
Comment: Protecting privacy in the cloud
Cloud computing is rapidly emerging to complement the traditional model of software running on, and data being stored on, PCs and servers, especially as IT departments look to drive efficiencies in the current economic climate. However, consumer advocates, organisations, and regulators are raising a number of important privacy questions concerning how information and interactions are handled in this environment.
Comment: Conforming to PCI DSS
Organisations that transmit, store or process payment card details and that fail to comply with the Payment Card Industry Data Security Standard (PCI DSS) face serious penalties and potential fines of £50K+, damage to brand reputation, loss of business and the risk of closure, says Mike Gillespie, director at independent protective security consultancy, Advent IM. It’s an issue of great concern to many businesses and a topic much debated on business forums.