This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Opinion

Women in IT security:  Carpe Diem

Women in IT security: Carpe Diem

Mentoring and promotion of success can increase the presence and profile of women in security, but mostly, women must seize their own opportunities says Barbara Nelson.

Talent has no gender

By

In the current print issue, SC Magazine UK talks to women in the industry about their experience, asks if data is secure when held by a cloud provider and assesses how ready we are for the new EU Data Protection Regulation.

Viewpoint: Transferring the risk

Viewpoint: Transferring the risk

Companies will have to get used to third-party assessments of their information security risk, says Simon Saunders

Last word: Cracking the cyber crime code

Last word: Cracking the cyber crime code

Concerted cooperative effort by defenders should at least match that of attackers, suggests Daniel Shugrue

CeBIT 2014 sees Anglo-German cooperation

CeBIT 2014 sees Anglo-German cooperation

CeBIT further sharpened its profile as one of the world's leading IT events for decision-makers, reports Roland Ackermann

Security of 'Things' to be embedded

Security of 'Things' to be embedded

Security and the Internet of Things (IoT) were the top themes of "Embedded World 2014" in Nuremberg, Germany, earlier this year, reports Roland Ackerman

A long, hot summer looms

By

The evolving threat of cyber-espionage and how to address it, the onslaught of BYOD in the office and cyber insurance are all on this summer's horizon.

Out of the bunker: A view from the C-suite

Out of the bunker: A view from the C-suite

Cyber security can't remain an IT issue. It needs to be addressed and filtered from the C-suite throughout the business, explains Rangu Salgame, CEO of growth ventures at Tata Communications.

The enemy within - beware the insider threat

The enemy within - beware the insider threat

Being alert to the danger of outside attacks is one thing, but like charity, security begins at home. Expect the unexpected, warns Geoff Sweeney, CTO of Tier-3.

Bitcoin: Protection in demand

Bitcoin: Protection in demand

Precautions must be taken to protect your Bitcoin horde, says LogRhythm's Mark Vankempen

Of cryptography and conspiracy stories

Of cryptography and conspiracy stories

Encryption integrity is called into question following NSA leaks, says Alan Kessler, CEO of Vormetric

Context is king

Context is king

Context-aware security can make intelligent decisions while allowing mobile users to get the job done.

BYOD: Facing up to the inevitable

Businesses can accept employee device promiscuity without causing difficulties for IT management, says Centrify's Darren Gross.

Can the cloud be secure?

Can the cloud be secure?

Blaming cloud providers for giving in to the demands of US intelligence is a naive approach to a complex issue.

Last word: Action stations

Last word: Action stations

The government has done its bit for cyber security - now it's up to businesses to take action, and quickly.

Viewpoint: Sell yourself better

Viewpoint: Sell yourself better

Having a hard time getting security budget approval? Start by being relevant and communicating.

Professional monitor in association with (ISC)2: Understanding the impact of cloud computing

Professional monitor in association with (ISC)2: Understanding the impact of cloud computing

Understanding cloud computing's impact on all aspects of IT is vital, and this requires a broader set of skills and knowledge that meet the rapid evolution of the industry head on.

Keeping ahead of the threats

Keeping ahead of the threats

By

Using the incident pit technique in the wake of an attack is the best way to see off future threats to your organisation.

Anti-virus products should pack a punch

Anti-virus products should pack a punch

By

Believe an anti-virus vendor's marketing spiel and you might end up with a naff product - so do your homework.

Fun in the sun at April's infosec events

Fun in the sun at April's infosec events

By

We are always spoilt in April with not only Infosec, but 44Cafe and BSides London too - and this year was another corker.

Professional monitor in association with (ISC)2: Infosec professionals need to work with law enforcement

Professional monitor in association with (ISC)2: Infosec professionals need to work with law enforcement

Collaboration between infosec professionals and law enforcement agencies is vital, says Victoria Baines, the European Cybercrime Centre's strategy and prevention chief.

Lock down your Macs

Lock down your Macs

By

Pay attention to the Macs in your office, especially if they are used by people unaware of the risks they present.

Don't judge potential and existing employees through automated analysis

Don't judge potential and existing employees through automated analysis

By

Neither automated analysis, nor the manual reading of Twitter posts, is a useful practice for HR to engage in.

Professional monitor in association with (ISC)2: Women in Security

Women in Security, recently launched by (ISC)2's London chapter, is actively encouraging women to join the profession and take on those roles for which they are often overlooked.

The trouble with re-using passwords

The trouble with re-using passwords

By

Password re-use, not to mention default and blank passwords, can bring your whole network to its knees.

Dual-use technology isn't all bad

Dual-use technology isn't all bad

By

We shouldn't let the potential misuse of a product in the wrong hands blind us to its benefits in the right ones.

Professional monitor in association with (ISC)2: Convergence of physical and IT security

Professional monitor in association with (ISC)2: Convergence of physical and IT security

The convergence of physical and IT security calls for infosec practitioners to adopt 'a design principle', says Eduard Emde, president of professional body ASIS International.

The threat of network tunnelling to businesses

The threat of network tunnelling to businesses

By

Sensitive data can be tunnelled out of your network in many ways. Fortunately, there are just as many ways to stop it.

BMWs: Gone in 60 keystrokes

BMWs: Gone in 60 keystrokes

By

The vulnerability of BMWs to 'no key' theft is a case study in what happens if the lessons of IT security are ignored.

Professional monitor in association with (ISC)2: Global Information Security Workforce Study

Richard Nealon, information security assurance manager and co-chairman of the (ISC)2 EMEA Advisory Board, explains why the organisation's Workforce Study is so important.

What does your phone say about you?

What does your phone say about you?

By

Wireless sniffing tools can tell you - and potential wrongdoers - a lot about users of mobile devices.

44Con: bigger, better, uncut

44Con: bigger, better, uncut

By

This year's 44Con did the industry proud, from the new attack on Enigma to the caffeine-infused BlackBerry Lounge.

Professional monitor in association with (ISC)2: Infosec professionals need multiple skills

Effective security requires winning hearts and minds, says Colette Hanley, head of information security compliance at online communications brand Skype.

Tricks of the infosec trade

Tricks of the infosec trade

By

Sending hackers on a wild goose chase, and 'playing dead' in front of thieves, are brilliant ploys - but they're not enough.

Tossing the cyber

Tossing the cyber

By

Stuxnet-fuelled talk of the dawn of cyber warfare is, alas, misguided. Sadly, keyboards will never replace guns.

Professional monitor in association with (ISC)2: SMBs need security skills development

The new EU regulation regarding data protection has highlighted the dire need for security skills development among small and medium-sized businesses.

Mobile security: an update

Mobile security: an update

By

Mobile device management might have progressed - but so too have the attack vectors and vulnerabilities.

Supermarket (virus) sweep

Supermarket (virus) sweep

By

The Curious Case of the Worm-Infected Photo Booth lays bare the perils of shunning security in favour of usability.

Professional monitor in association with (ISC)2: infosec is a global issue

The international industry at large can have a bigger say on the big issues, says John Colley, managing director of (ISC)2 EMEA and co-chair of its Advisory Board.

Honey I shrunk the script kiddies

Honey I shrunk the script kiddies

By

A honeytrap on your network can exploit hackers' desire for an easy win and enable you to catch them red-handed.

Paying off your security debts

Paying off your security debts

By

There are some interesting ideas bouncing around on the concept of technical debt and security debt.

Professional monitor in association with (ISC)2: the infosec skills gap

There is growing acceptance that a concerted effort is needed to overcome the skills gap in the information security industry - and graduate schemes are the answer.

Employees should secure LinkedIn profiles

Employees should secure LinkedIn profiles

By

If your staff reveal all on their LinkedIn and Facebook profiles, then your company is a sitting duck for fraudsters.

Don't blame the captain

Don't blame the captain

By

When disaster hits, it's too easy to pin the blame on one person - fixing the underlying problems is better.

Professional monitor in association with (ISC)2: the threat of BYOD

The increasing trend of 'bring your own devices' to work will become the norm for businesses imminently, completely changing the face of information security.

How secure is voice recognition software

How secure is voice recognition software

By

Voice-recognition software has some very interesting implications for security, as soon we might all be using it.

In defence of Operation Ore

In defence of Operation Ore

By

Operation Ore has become a surprising target of criticism, but a close look at the evidence tells the real story.

Professional Monitor: in association with (ISC)2

'What do you want to be when you grow up, Timmy ? A fireman, perhaps? An astronaut?' 'I want to be an information security professional, daddy! Please let me be a CISO, please!'

Technology should not be blamed for problems in society

Technology should not be blamed for problems in society

By

As ever, technology is being blamed for all of society's ills. A look at the facts behind the stories exposes some flaws.

Professional Monitor: in association with (ISC)2

Are companies thinking about how young people's attitude to technology will affect their business when they come to join the workforce? If not, then they certainly should be.

Sign up to our newsletters