ITsecurity
twitter facebook rss

Time to reject GCHQ and rebuild a Free Albion

Posted by Kevin on December 18, 2014

One of my favourite companies is F-Secure. F-Secure is a company that hasn’t just sat back and said, ‘Oh, how terrible – governments are spying on us.’ F-Secure is fighting back by developing the technology that makes it more difficult for governments to spy on people. I recently asked F-Secure’s Sean Sullivan why his company […]

Is WIRE a threat to Privacy?

Posted by Alexander Hanff on December 4, 2014

This week saw the launch of Skype Co-Founder Janus Friis’ new social communications application, WIRE.Β  There has been a great deal of noise about it in the press which is to be expected given Friis’ pedigree.Β  One of the points being made is that WIRE is based in Switzerland and complies with EU privacy laws, […]

Is the Age of Consolidation in the security market over?

Posted by Kevin on November 24, 2014

When Symantec recently separated into two companies, one to handle the anti-virus part of the business and the other to handle the Veritas information management side, I wrote a blog for High-Tech Bridge and spoke to its founder and CEO Ilia Kolochenko. Ilia Kolochenko, CEO and founder of security firm High-Tech Bridge, is not surprised […]

Taking Back My Privacy – DIY Secure Phone

Posted by Alexander Hanff on November 14, 2014

Over the last week I decided to start a new project mostly as a proof of concept but also down to curiosity as to how easy/difficult it would be – I decided to try to make myself a secure phone. Hardware-wise it was fairly simple, I have an old HTC Desire handset which has been […]

The suppression of freedom and privacy in the UK

Posted by Kevin on September 28, 2014

The UK is rapidly becoming the internet’s ‘free world’ freedom and privacy weak spot. The cause is the tragic simultaneous alignment of several factors: there is no single freedom guaranteed by law. There is no written constitution in place to protect the people from the excesses of government. the British public is just about the […]

The cost of a breach

Posted by Kevin on September 21, 2014

I always find this sort of statement totally absurd. The average for which companies? all companies? some companies? which companies? The average of which breaches? all breaches? some breaches? which breaches? which of the unreported breaches are included and which are excluded? Over what period of time? all time? last two years? current? What costs […]

ITsecurity Daily News: 08/26/2014

Posted by Kevin on August 27, 2014

The ITsecurity daily security briefing: Wednesday, August 27, 2014. If you find this security briefing useful, please spread the word via social media. If you have any comments or recommendations, please email kevtownsend at gmail dot com. News Papers/Reports WebThings Events M&A Alerts News Secret data retention discussion paper leaked Via The Sydney Morning Herald. […]

Back-to-school advice

Posted by David Harley on August 23, 2014

I apologize in advance: I don’t intend to pack my occasional posts here with references to my colleagues at ESET, and I’m sure there’s good advice on similar topics around from other bloggers, but for obvious reasons, I tend to see a lot of the writing they produce even before it’s published, whereas there are […]

Securing a laptop is harder than you think

Posted by Kevin on August 14, 2014

There’s a superb e-book called Information Security for Journalists written by Silkie Carlo (a London-based journalist, activist, and a campaigner at the Courage Foundation) and Arjen Kamphuis (co-founder and Chief Technology Officer of Gendo). It has a foreword by Gavin MacFadyen, Director of the Centre for Investigative Journalism: This handbook is a very important practical […]

Automated vs hybrid vulnerability scanning

Posted by Kevin on July 29, 2014

A CIO’s experience You will have heard about programs that perform automated security scanning for website safety assessments. Such scanning software was developed in response to international standards such as PCI DSS and the security requirements they specify. While these scanners may be familiar to e-commerce firms, for owners of businesses where no such standards […]