infosec - News, Features, and Slideshows

News about infosec
Features about infosec
  • The changing role of a the CISO

    Michael Sutton is the CISO of ZScaler. He has forged a long career working in information security and has seen many changes over the years. We spoke to him at AusCERT 2016 about his career, the changing role of the CISO and what he’s seeing in the world of infosec.

    Anthony Caruana | 27 May | Read more

  • Why physical security (and InfoSec!) still matter

    In the current era of mega-(should I say giga-?) breaches with tens to hundreds of millions of lost customer records and the hacking-of-everything, it is safe to assume that the logical security of devices becomes almost more important than the physical protection around those assets. While it is true that the logical (in-)security of devices renders "remote attacks" (attacks that are carried out against the system from another location than where the device is located, i.e. via a communication channel with a protocol such as TCP/IP, Ethernet, Bluetooth, or CDMA, GSM, etc.) possible, there is still an important defense layer that surrounds your device: the physical security.

    Michael S. Oberlaender | 27 Aug | Read more

  • Information overload: Finding signals in the noise

    Signal-to-noise ratios are hard to manage. As a security professional, you want the threat data, you want the attack notifications and alerts, and you need intelligence. But, when there's too much coming in, those alerts and notifications fall to the wayside. They're easily dismissed and ignored.

    Steve Ragan | 30 May | Read more

  • CISOs taking a leap of faith

    If we're lucky, We'll all have a chance once in our careers to take a risk and use our skills and experience to do something we truly love. Sometimes the career risk is low, but sometimes it's truly a leap of faith--one that offers potentially big rewards as well as the risk of major setbacks.

    George V. Hulme | 29 May | Read more

Whitepapers about infosec

  • Why Technology Supply Chain Resiliency Matters

    With technology supply chains rapidly evolving to all corners of the globe, doors continually open for unsavoury elements to find new ways to take advantage. Whether for personal gain, monetary gain, criminal activity, espionage, or military threat, black hats keep unearthing opportunities to exploit supply chain vulnerabilities.