Publication: Infosecurity - Blog

First reported Jul 16 2014 - Updated Jul 16 2014 - 2 reports

Do Increasing Worries about Insider Threats Mean it is Time to Take Another Look at DRM?

The encryption vendor SafeNet publishes a Breach Level Index  that records actual reported incidents of data loss. While the number of losses attributed to malicious outsiders (58%) exceeds those attributed to malicious ins ... ... [Published Infosecurity - Blog - Jul 16 2014]
First reported Jul 07 2014 - Updated Jul 07 2014 - 2 reports

Fight the Power

It was during an interview at Infosecurity Europe when my interviewee said to me “Every single vendor in this exhibition hall does exactly the same thing” when I realized that I’m actually quite protective about our industry’s vendor ... ... [Published Infosecurity - Blog - Jul 07 2014]
First reported May 22 2014 - Updated May 22 2014 - 2 reports

Infosecurity Europe 2014: Experts Highlight Security as a Business Enabler and Preventing Cyberwar

At this year’s Infosecurity Europe conference and exhibition, held at London’s Earls Court, senior figures from both government and industry called for greater collaboration on how security intelligence is shared, in order to protect against cyber-attacks ... [Published Infosecurity - Blog - May 22 2014]
First reported May 20 2014 - Updated May 20 2014 - 1 reports

Why Heartbleed Reflects Badly on the Information Security Industry

“Heartbleed could have been prevented”, Vidhya Ranganathan, Accellion’ s SVP of security, told me at Infosecurity Europe 2014 . These are words that I’d be hearing several times over my three day ‘staycation’ in Earl’s Court at the end of April. Don’t ... [Published Infosecurity - Blog - May 20 2014]
First reported May 19 2014 - Updated May 19 2014 - 2 reports

Interview: Chris Boyd, aka @paperghost

Chris Boyd is a malware intelligence anaylst at Malwarebytes . You might know him better by his previous roles at FaceTime, GFI, ThreatTrack or as @paperghost. Despite his d ... ... [Published Infosecurity - Blog - May 19 2014]
First reported May 08 2014 - Updated May 08 2014 - 1 reports

Supply Chain: Friend or Foe?

By Massimo Cotrozzi It is now commonplace for large companies, and even SMEs, to have in place a number of IT interfaces with suppliers, partners and contractors. Some may provide one-off services and for others, there may be an ongoing relationship. For ... [Published Infosecurity - Blog - May 08 2014]
First reported Apr 28 2014 - Updated Apr 28 2014 - 1 reports

Web Security 3.0 – Is Your Business Ready?

As the web has evolved, so have the security products and services that control our use of it. In the early days of the “static web” it was enough to tell us which URLs to avoid because the content was undesirable (porn, etc.) As the web became a means ... [Published Infosecurity - Blog - Apr 28 2014]
First reported Apr 28 2014 - Updated Apr 28 2014 - 1 reports

Web Security 3.0 – Is Your Business Ready?

As the web has evolved, so have the security products and services that control our use of it. In the early days of the “static web” it was enough to tell us which URLs to avoid because the content was undesirable (porn, etc.) As the web became a means ... [Published Infosecurity - Blog - Apr 28 2014]
First reported Apr 16 2014 - Updated Apr 17 2014 - 2 reports

Windows XP: To Upgrade or Not to Upgrade?

By Mark Brown Much has been made of Microsoft’s decision to stop security support for Windows XP over the last few weeks. Some commentators have likened it to something of a Y2K ... ... [Published Infosecurity - Blog - Apr 16 2014]
First reported Apr 14 2014 - Updated Apr 14 2014 - 1 reports

A Legal Perspective on Big Data

By Punam Tiwari On my return home from my Cheltenham Head Office one evening, I happened upon an opinon article quite randomly lying around in the train by David Aaronovitch of The Times,   titled “Privacy activists don’t speak for most of us” . The ... [Published Infosecurity - Blog - Apr 14 2014]
First reported Mar 21 2014 - Updated Mar 21 2014 - 1 reports

Integrating Test Data into Application Lifecycle Management

It will not be news to anyone who has written code that the time to kill software bugs is early on in the application development lifecycle, before they can have a major impact. This is important for three reasons: first, better code is likely to be ... [Published Infosecurity - Blog - Mar 21 2014]
First reported Mar 10 2014 - Updated Mar 10 2014 - 1 reports

Convergence of SIEM and Forensics

Sometimes technology areas that once seem distinct converge. Indeed, there was a time when the term convergence was used, without qualification, to refer to the coming together of IT and traditional telephone networks, something that for many is now ... [Published Infosecurity - Blog - Mar 10 2014]

More Content

All (19) | News (0) | Reports (0) | Blogs (19) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
Do Increasing Worries about Insider Threats Mea... [Published Infosecurity - Blog - Jul 16 2014]
Do Increasing Worries about Insider Threats Mea... [Published Infosecurity - Blog - Jul 16 2014]
Fight the Power [Published Infosecurity - Blog - Jul 07 2014]
Fight the Power [Published Infosecurity - Blog - Jul 07 2014]
Infosecurity Europe 2014: Experts Highlight Sec... [Published Infosecurity - Blog - May 22 2014]
Infosecurity Europe 2014: Experts Highlight Sec... [Published Infosecurity - Blog - May 22 2014]
Why Heartbleed Reflects Badly on the Informatio... [Published Infosecurity - Blog - May 20 2014]
Interview: Chris Boyd, aka @paperghost [Published Infosecurity - Blog - May 19 2014]
Interview: Chris Boyd, aka @paperghost [Published Infosecurity - Blog - May 19 2014]
Supply Chain: Friend or Foe? [Published Infosecurity - Blog - May 08 2014]
Web Security 3.0 – Is Your Business Ready? [Published Infosecurity - Blog - Apr 28 2014]
Web Security 3.0 – Is Your Business Ready? [Published Infosecurity - Blog - Apr 28 2014]
Windows XP: To Upgrade or Not to Upgrade? [Published Infosecurity - Blog - Apr 16 2014]
Windows XP: To Upgrade or Not to Upgrade? [Published Infosecurity - Blog - Apr 16 2014]
A Legal Perspective on Big Data [Published Infosecurity - Blog - Apr 14 2014]
Integrating Test Data into Application Lifecycl... [Published Infosecurity - Blog - Mar 21 2014]
Convergence of SIEM and Forensics [Published Infosecurity - Blog - Mar 10 2014]
Let’s Stay Together [Published Infosecurity - Blog - Feb 11 2014]
On the Heels of Feds: Are State and Local Gover... [Published Infosecurity - Blog - Feb 10 2014]
1
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Do Increasing Worries about Insider Threats Mea... [Published Infosecurity - Blog - Jul 16 2014]
The encryption vendor SafeNet publishes a Breach Level Index  that records actual reported incidents of data loss. While the number of losses attributed to malicious outsiders (58%) exceeds those attributed to malicious ins ... ...
Do Increasing Worries about Insider Threats Mea... [Published Infosecurity - Blog - Jul 16 2014]
The encryption vendor SafeNet publishes a Breach Level Index  that records actual reported incidents of data loss. While the number of losses attributed to malicious outsiders (58%) exceeds those attributed to malicious insiders (13%), SafeNet claims ...
Fight the Power [Published Infosecurity - Blog - Jul 07 2014]
It was during an interview at Infosecurity Europe when my interviewee said to me “Every single vendor in this exhibition hall does exactly the same thing” when I realized that I’m actually quite protective about our industry’s vendor ... ...
Fight the Power [Published Infosecurity - Blog - Jul 07 2014]
It was during an interview at Infosecurity Europe when my interviewee said to me “Every single vendor in this exhibition hall does exactly the same thing” when I realized that I’m actually quite protective about our industry’s vendor community. The ...
Infosecurity Europe 2014: Experts Highlight Sec... [Published Infosecurity - Blog - May 22 2014]
At this year’s Infosecurity Europe conference and exhibition, held at London’s Earls Court, senior figures from both government and industry called for greater collaboration on how security intelligence is shared, in order to protect against cyber-attacks ...
1 2 3 4
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.