Many hands may make light work, but do they also introduce more risk? Danny Bradbury explores the thorny issue of security in crowdsourced software development
Many hands may make light work, but do they also introduce more risk? Danny Bradbury explores the thorny issue of security in crowdsourced software development
With the 2012 Olympics fast approaching, Davey Winder takes a look at the growing problem of IP espionage in the big, expensive world of sport…
Easygoing, engaging, and ready with a firm handshake, Michael Higgins of the New York Times bucks the stereotypes when one thinks of how an executive with years of experience in the military and intelligence communities might be perceived. Drew Amorosi sat down with the news organization's chief security officer to gain insight on how a top-notch media company maintains its defenses
Location, location, location. It's a slogan that has deep meaning for the real estate market, but it also maintains significant relevance to the regulatory and compliance risks associated with cloud computing in the era of globalization. Stephen Pritchard investigates
The beginning of a new year is often a time for predictions or, sometimes, reassertions. Drew Amorosi revisits past prognostications from Infosecurity's editorial board to assess its foretelling prowess, examine the year that was 2010, and gather some new projections for 2011 and beyond
The cost savings of cloud computing versus the anticipated security risks: it's the broken record that seems to be on continuous loop for security professionals contemplating their stragegy. Ted Kritsonis examines the key considerations
Each year, January brings many expected happenings and issues; most of which I regard with much disdain. In addition to the post-Christmas blues, the miserable weather, the fast-abandoned new year's resolutions, and the frantic and often misplaced desire to start afresh, it also encourages predictions.
Handing over your data to a cloud provider may appear almost irresistible from a cost perspective, but what about the security and compliance concerns? Kevin Townsend examines both sides of the argument