ITsecurity
twitter facebook rss

Contributors

 

Dr Brian Bandey

Dr Bandey’s Surgery: IP, Cloud, Big Data and e-Safety Laws Anatomised

Dr Brian Bandey is one of the world’s leading experts on Computer Law and the International application of Intellectual Property Law to Computer, Internet and Cloud Programming Technologies. He is the author of definitive legal practitioners textbooks. His legal opinions are regularly published and his commentaries on legal issues are syndicated throughout the world by such organisations as the BBC & Washington Post. Dr. Bandey is now well-advanced upon the unique route of studying for a 2nd Doctorate of Law on Internet Law (Copyright in the Construction, Structure and Operation of Internet/Cloud Technologies) at the University of Oxford, England. Additional & current research interests include: E-Safety Law in Education, Corporate E-Safety Law, Cloud Computing Law, Data Protection Law and Security Software and International Big Data Law.

Alexander Hanff – CEO Think Privacy Inc

Globally respected Privacy expert

For over 20 years Alexander has worked in technology and for the past 6 years after returning to University to study the impact of technology on society, he has been a key figure in the ongoing global privacy debate. Alexander managed Privacy International’s digital privacy portfolio for 3 years and has spoken at dozens of conferences around the world. He has led the debate against behavioural profiling and online tracking in Europe leading to changes in the ePrivacy Directive and continues to champion for the public against the practices of Big Data. For the last 16 months Alexander has taken on a consulting role working on privacy enhancing technologies and services but continues to write about and campaign on digital privacy issues. Alexander is passionate about technology and how it can be used to empower people across the globe but is also acutely aware of how it can be abused to exploit those very same people and as such has dedicated his life to fighting such abuses.

David Harley

David Harley on malware

David Harley has worked in security since 1986, notably as security analyst for a major medical research charity, then as manager of the NHS Threat Assessment Centre. Since 2006 he has worked as an independent consultant. He also holds the position of Senior Research Fellow at ESET but does not speak on ESET’s behalf here. His books include Viruses Revealed and the AVIEN Anti-Malware Defense Guide for the Enterprise.

He is a frequent speaker at major security conferences, and a prolific writer of blogs and other articles. If he had any free time, he would probably spend most of it playing the guitar.

Dr Monica Horten

European expert on Internet-related policy (including copyright)

Dr Monica Horten is a Visiting Fellow, London School of Economics and Political Science. She is a member of two European expert groups, including being an independent expert on the Council of Europe’s Committee of Experts on Cross-border Flow of Internet Traffic and Internet Freedom.

She is the author of two books – A Copyright Masquerade: how corporate lobbying threatens online freedoms & The Copyright Enforcement Enigma: Internet politics and the Telecoms Package – with a third forthcoming in 2016. Her Iptegrity blog has a core readership among the Brussels policy community. She has been an invited speaker at conferences around Europe. Her academic research, which includes peer-reviewed academic papers, has had measurable impact both in the media and in scholarly journals. In a private consulting role, she assists with policy analysis and reports.

Sorin Mustaca, (ISC)2 CSSLP, CompTIA Security+, Project+

Security is everyone’s responsibility

Sorin Mustaca, (ISC)2 CSSLP, CompTIA Security+, Project+ has started to work with computers when the Commodore was in its glory and the fastest PC was running at 8 MHz (in Turbo mode). Since 2000 he is active in the IT Security industry and worked until 2014 for the security vendor Avira as product manager for all antivirus products. Serving the security needs of so many different users, made him think that there are also other ways to help the users: teaching them about IT security. For this reason he has published a free eBook about how to “Improve your security” (www.improve-your-security.org) and is maintaining his blog on IT Security at http://www.sorinmustaca.com. Sorin’s opinion on IT Security is constantly requested and published in well-known magazines like USA Today, Washington Times, Security Week and many more.

Bev Robb @teksquisite

Internet security, Darknet research & social media consultant by stealth…

Bev Robb was the prior Publication Manager at Norse Corporation and is a “Thought Leader” with the #DellInsightPartner program at the Dell PowerMore blog. She has a B.S. in Sociology from Southern Oregon University. and has been a computer security/Internet consultant for 20+ years and started her digital life on the Internet before the advent of the Mosaic browser. She has broad experience in network administration, Internet security, social media, hardware (CompTia A+ certified), security research, Darknet research and technical support.

Her past lives include coding (Basic, Cobol, C, Java, PHP, etc), databases (SQL, MySQL, Oracle), commercial web development, hardware (A+ certified), ethical hacking, botnets, honeypots, blogging, Darknet research – you name it, she’s probably done it! Her level of expertise is very broad. She thrives on security, thought leadership, diversity, creativity, technology, infosec, gadgets & social media.

Joseph Saviri

Regulatory, Technology and Surveillance Researcher

Joseph Savirimuthu is a Senior Lecturer in Law in the University of Liverpool. Joseph’s research and teaching principally involves analysing the regulatory challenges and issues posed by new and emerging communication technologies for traditional approaches to governance. Some areas examined include: surveillance, identity theft, corporate information security, child online safety, peer-to-peer file sharing controversies, online dispute resolution and managing personal and corporate identities. During the past few years Joseph has directed his research towards information governance and has presented papers in Brussels, Hamburg, Washington and Beijing.

Joseph has embarked on a project that explores the legal, ethical, social and technological challenges posed by autonomous systems and robotics as they relate to aging, healthcare and warfare. In addition to this his research gives particular prominence to data protection, privacy and security issues as they impact emerging public policy issues. In undertaking this project Joseph aims to blend concepts such as risk, cognitive engineering, bricolage and complexity into legal approaches to regulating algorithms and complex information systems. This approach builds on previous inter-disciplinary approach – drawing on fields such as evolutionary biology, military theory, and complex/systems theory.

All views expressed are personal and are not those of the University of Liverpool.

Robert Schifreen

Security isn’t a product, but an attitude.

Robert Schifreen is the founder of SecuritySmart.co.uk, which offers measurable IT security awareness training in bite-sized chunks delivered by email. His career in IT security spans more than 30 years as a practitioner, writer, commentator, trainer, consultant and broadcaster.

Robert is a regular and sought-after commentator on all aspects of IT security for all major UK broadcast media, and has presented at conferences across Europe and in the US.

Rob Slade

Why be normal?

Rob Slade started out as a teacher, then got sidetracked into virus research, then got sidetracked into reviewing AV programs, then got sidetracked into reviewing technical books. He’s taught on five continents, and given away tens of thousands of dollars worth of books at lots of different meetings.

You can get further information on Rob here, and on Wikipedia.

Richard Smith

Financial skulduggery – especially of the tech variety

Veteran IT bod with an interest in the seamier side of finance and tech. Former bond analyst. Former aviator. Former whippet. Still married.

Also blogs at www.nakedcapitalism.com

[Anyone who wishes to contact Richard should do so via Twitter.]

Tara Taubman-Bassirian, LL.M

Specialist in internet related legal matters

Research, consulting, speaking and writing at the cross roads of Intellectual Property, Privacy and Data Protection; Reform of EU Directives – Geo-location and Privacy.

Tara was an early internet and social media adopter. She is now researching the challenges of traditional regulation in the era of new technologies. Her work is at the crossroads of intellectual property and privacy/data protection.

She writes on all current legal news related to the new technologies.

Josh Townsend

Cyber from the gaming perspective

Josh is a freelance writer and musician with a special interest in the gaming industry. A digital native, born to a generation for which technology has changed the way that business, education and social interaction is delivered, he now uses the technology in all aspects of his work – from music composition and sound engineering to internet blogging.

He produces and delivers the series of video blogs in Insights.

A keen walker and photographer, Josh enjoys exploring Dartmoor and the rugged Cornish coast.

Kevin Townsend

Opinions on current information security news and issues

Kevin Townsend has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialised in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

For two years he provided half of the news stories for Infosecurity Magazine, before leaving in April 2014 to establish this site.

He is also Live Research Section Editor at Wisegate. Wisegate is a gated forum of senior managers and C-level officers working at the coalface of information security. This provides insight into and understanding of what is really happening in security — and not just what the vendors, publishers and governments want us to believe.

Robin Wood

Penetration testing issues and passwords

Robin has over eight years experience in computer security and over fifteen in software development. He has run security audits for many large banks, trading firms and various other international organizations.

Robin is an active member of the computer security community, regularly publishing blog posts and security tools on topics varying from auditing security cameras to password analysis. He has spoken at various security conferences including ShmooCon, DEFCON Wireless Village and BSidesLondon and is currently organising his own conference, SteelCon.

He has various certifications, the main one being CHECK Team Leader for Applications. This is a tough UK-based certification required when testing for the government or military.

Martin Zinaich

InfoSec Dude

Martin Zinaich is the Information Security Officer for a large US City. Before joining the public sector, Martin spent 10 years in the private sector designing discreet RF and digital circuits. He has written articles published in Popular Communications, Network World and Novell Research AppNotes. Qualifications include Bachelor of Science in Information Technology, Bachelor of Science in Business Administration, Associate of Science in Electronics Technology, CISSP, CISM, CISA, CRISC, CSSLP, C|EH, CNE, MCP – and a Toastmasters Competent Communicator (CC).

Martin has been a featured speaker at Information Security World, The Institute of Management Accountants, The Association of Certified Fraud Examiners, The Institute of Internal Auditors, The Florida Audit Forum, The Association of Airport Internal Auditors, and The Florida Government Finance Officers Association. He also participates in the Information Systems Security Certification Consortium’s Safe and Secure Online program, helping children ages 7-14 learn how to protect themselves online.