Expert analysis
Separating single sign-on myths from fact
Single Sign On (SSO), the ability to authenticate only once and have automatic access to many systems, has many potential benefits ranging from lower IT overhead costs to …
Security pros should listen with their heads, not their hearts
There is a phrase that has become quite popular in information security circles and it goes along the lines of “there are two types of organizations, those that have …
Unintended, malicious and evil applications of augmented reality
Most new products begin life with a marketing pitch that extols the product’s virtues. A similarly optimistic property holds in user-centered design, where most books …
The privacy cliff and how not to fall off it
We are all hearing the phrase “fiscal cliff” considerably more times than is useful. So far, however, nobody’s mentioned a “privacy cliff.” They …
Document shredding: the why and the how
Tim McBride serves as the Vice President and General Manager of Secure Destruction Services for Recall North America. He is focused on driving improvements in safety, …
Information risks in the enterprise
Ian Whiting is the CEO Titania, a developer of security auditing and testing software. In this interview he discusses managing information-related risks in the enterprise, …
How do you protect your phone and your data?
Given the risks we run in not securing our phones, you’d be forgiven for thinking it must be a task requiring a doctorate in computer science. In reality, however, …
Privacy tips for social networking, apps and geolocation
Many people confuse data privacy and data security. While there are similarities, privacy and security are not the same thing. Data security focuses on the confidentiality, …
CEO hot seat: Dave Hansen
Recently SafeNet announced the appointment of Dave Hansen, an information security and cloud veteran, as the company’s new President and CEO. Help Net Security put him …
Top five hurdles to security and compliance in industrial control systems
For many decades, Industrial Control Systems (ICS) have been the operational systems relied upon to safely and reliably deliver the essentials of daily life. Sometimes …
Cyber security needs to be a board level issue
As part of the much talked about Cyber Security Strategy, the UK Government is “committed to helping reduce vulnerability to attack and ensure that the UK is the safest …
How the security threat landscape will evolve this year
Where 2012 was a period of great innovation amongst cybercriminals and hackers – many of whom keenly develop new and hybridized attack vectors that build on a constantly …