Infosecurity Voice

RSSSubscribe to this blog
About Author

(ISC)² is the largest membership body of information security professionals with over 87,000 Certified members across 135 countries, and is responsible for the gold standard CISSP© certification. In the EMEA region, it has over 13,500 members. This blog is written by John Colley and Richard Nealon, as co-chairs for the (ISC)² Europe Middle East and Africa advisory Board. Both have over 20 years of industry experience and are long-time advocates of the information security profession.

Contact Author

Email (ISC)²

Twitter Profile

Linked-in Profile


Recent Posts

Consumer technologies in healthcare - what are the security challenges?

Ensuring privacy as well as clinical safety

Consumer-oriented technologies and services have already established a foothold in healthcare. If you visit a modern medical establishment you will see personal electronic devices (PEDs) being used. There may be some strictly controlled zones where usage is not permitted, but...

The EU's 'right to be forgotten' ruling is a problem for businesses too

CISOs need to work out some processes and quickly

CISOs need to work out some processes and quickly The European Court’s (EU) recent ruling that Google must erase search results at the request of people is only the tip if the iceberg. It has spawned a host of issues...

Gameover Zeus and Cryptolocker are a warning

Relief looks like being temporary

The combined and apparently heroic effort from the National Crime Agency, Europol and the FBI to take out the heart of the botnet fuelling Gameover (or GOZeus) and Crytolocker last week is a significant development. Unfortunately, it is unlikely to...

The eBay security breach - more lessons to learn

The consequences of the eBay breach may not be known for some time

Hot on the heels of Heartbleed (albeit a different type of security issue), the eBay data breach has yet again rocked the security world - the personal details of 145 million or more active users are in the hands of...

Why healthcare urgently needs certified security professionals

Data privacy governance in healthcare can quickly become a labyrinth.

Information security risks in healthcare are growing as ever greater use is made of information technology to improve care outcomes. While there are undoubtedly medical benefits to increased sharing of medical information, given the number and diversity of healthcare organisations,...

Security's biggest challenge is the unknown

Defeating cyber-criminals demands that we train more and better professionals

Defeating cyber-criminals demands that we train more and better professionals The complexity and variety of security attacks/breaches are growing at a phenomenal pace. Recently, we heard that Yahoo malware is turning PCs into bitcoin miners.  It is becoming increasingly clear...

Should tablets come with content warnings?

Tablets are portals to trouble

The tablet computer topped the Christmas list for children this year. My 7 and 9 year old both asked for an iPad Mini as did many of their friends. I managed to resist, extolling the virtues of the latest hand-held...

Cybersecurity 2014 - human defences hold the key

The demand for skilled security professionals will only grow

The demand for skilled security professionals will only grow The data breaches that took place in 2013 were game-changing in their size and scope. Adobe reported the compromise of over 38 million users, Chinese hackers cracked into the systems of...

Cybersecurity 2014 - human defences hold the key

The demand for skilled security professionals will only grow

The demand for skilled security professionals will only grow The data breaches that took place in 2013 were game-changing in their size and scope. Adobe reported the compromise of over 38 million users, Chinese hackers cracked into the systems of...

It's time to help EU legislators catch up

Infosec professionals can help shape EU data protection

The EU's draft data protection legislation represents a great effort on the part of governments to recognise and control information security risk. With this, the EU’s cyber security strategy has woken up to the risks that citizens and businesses face...