Infosecurity Opinions

  1. Comment: The magic triangle of information security

    Senior IT security veteran Michael Oberlaender explains why availability, integrity, and confidentiality of information are all vital to an organization’s goals and reputation. He also examines the balancing act of security, costs, and functionality that must be evaluated by any IT security professional.

  2. Comment: Securing web 2.0 in the workplace

    Simon Morris, research and development director at Pentura looks at how the adoption of web 2.0 makes the job of keeping email and the web free from attacks, malware and spam even more difficult. Yet, simply closing access to unapproved tools can be short sighted as unhappy employees drift to rival businesses with more enlightened policies

  3. Comment: Making protection against the impossible information security threats, possible

    The information security industry is changing and as more and more crime is committed online, security software vendors will have no choice but to adjust. Kevin Hogan, director of Symantec’s response centre explains how it is leading the market in responding to this shift…

  4. Comment: Exit strategy - How forensic ready are you?

    Losing a key employee is never easy, but it can be harder still if they take confidential company information with them. Duncan Gardiner, director forensic services at Epiq Systems outlines the steps that companies can take to protect their positions, both before and after such an event.

  5. Comment: How to stay mobile whilst keeping sensitive data safe

    Press coverage is, on the whole, to be welcomed; however negative publicity hurts your brand and image and does not help win hearts, minds and new customers. So why do so many companies actively court this by being so poor when it comes to handling sensitive data?

  6. Comment: Thoughts from a security researcher on Conficker

    Patrick Runald, senior threat research manager at Websense Security Labs shares his thoughts on Conficker as the worm reaches its first anniversary of appearing in the wild.

  7. Comment: USB sticks - An employees dream- IT’s worst nightmare

    Ironkey's John Jefferis explores the benefits, but also the information security issues surrounding USB sticks.

  8. Comment: The smart way to safer hospitals

    Over the past few years, the healthcare sector has become increasingly dependent on information technology. Contactless smart card technology has been used many years in other industries, and is now helping to solve some longstanding thorny issues in the healthcare sector: safeguarding patients and staff and protecting confidential patient information.

  9. Comment: Facilities managers taking on security

    Facilities and risk managers are feeling the knock-on effect of the economic climate by having more responsibility placed upon their shoulders; security provision being one. Steve Garton, director at Advent IM, outlines security issues facing these workers.

  10. Comment: Protecting privacy in the cloud

    Cloud computing is rapidly emerging to complement the traditional model of software running on, and data being stored on, PCs and servers, especially as IT departments look to drive efficiencies in the current economic climate. However, consumer advocates, organisations, and regulators are raising a number of important privacy questions concerning how information and interactions are handled in this environment.

  11. Comment: Conforming to PCI DSS

    Organisations that transmit, store or process payment card details and that fail to comply with the Payment Card Industry Data Security Standard (PCI DSS) face serious penalties and potential fines of £50K+, damage to brand reputation, loss of business and the risk of closure, says Mike Gillespie, director at independent protective security consultancy, Advent IM. It’s an issue of great concern to many businesses and a topic much debated on business forums.

  12. Comment: Back to information security basics

    As security companies add new technologies to meet the demands of both the evolving threat landscape and a compressed market, it is important they try not to forget about the core information security technologies that have been protecting businesses for decades

What’s hot on Infosecurity Magazine?