Doug Drinkwater

Doug is the international editor of TabTimes.com.

GDPR-defined personal data can be hard to find—here's where to look

What is DevSecOps? Developing more secure applications

What is DevSecOps? Developing more secure applications

DevSecOps is about introducing security earlier in the life cycle of application development, thus minimizing vulnerabilities and bringing security closer to IT and business objectives.

What is quantum cryptography? It’s no silver bullet, but could improve security

What is quantum cryptography? It’s no silver bullet, but could improve security

In the arms race between white and black hats, the infosec industry looks to quantum cryptography and quantum key distribution (QKD). That may be just part of the answer, however.

Famous malware threats: Where are they now?

Famous malware threats: Where are they now?

The headlines may be dominated by news of NotPeyta and Wannacry, but watch out for the ‘golden oldie’ malware like Conficker and Zeus. They are still dangerous.

What's the key to surviving as a cyber-security start-up?

What's the key to surviving as a cyber-security start-up?

It’s always a gamble to establish a start-up, but if you were to choose any sector where you’d fancy your chances of success, it would surely be cyber-security.

AI will transform information security, but it won’t happen overnight

AI will transform information security, but it won’t happen overnight

Artificial Intelligence technologies are evolving quickly, but can they aid an InfoSec community still grappling with default passwords and SQLi attacks?

Friends or enemies? Security vendors tiptoe towards collaboration

Friends or enemies? Security vendors tiptoe towards collaboration

The information security vendor community is extremely competitive. But when all suppliers supposedly share the common goal of making us as citizens and businesses secure, should they be doing more to work together?

CISOs, it’s time to bury the hatchet with your CIO

CISOs, it’s time to bury the hatchet with your CIO

The Chief Information Security Officer and the Chief Information Officer can be awkward bedfellows. We look at the how the two execs can work better together.

Cyber-security VCs are holding onto their cash – but that’s OK

Cyber-security VCs are holding onto their cash – but that’s OK

Are VCs cooling their interest in cyber-security companies? CSO investigates a market with just as many challenges and opportunities for investors.

Are InfoSec vendors ‘sowing confusion’ and selling ‘useless’ products?

Are InfoSec vendors ‘sowing confusion’ and selling ‘useless’ products?

Security vendors are doing just swell but how much do they do - outside of selling products - to help the world become a safer place? CSO Online investigates.

How to improve your incident response plan

How to improve your incident response plan

A well-formed, and well-tested, incident response can determine how well an organization responds to a data breach. CSO Online looks at how you can improve your own incident response plan so to reduce the impact of that data breach.

How to survive in the CISO hot-seat

How to survive in the CISO hot-seat

Today’s CISO is under more pressure than ever before. CSO Online looks at how security heads can survive in the hot-seat.

Load More