Infosecurity Magazine Features
Keeping Software Defined Data Centers Secure
Companies take all the aspects of an SDDC and think that everything has to be implemented at once.
Managing the Mobile Gap
"The frequency of updates is unparalleled. There have been 14 versions of iOS in the past year. And if you look at apps, every app update is a new app, every OS update is a new OS. And there are undocumented features with every update."
Cyber-Psychology: The Key to Securing the Human Element in Your Organization
Cyber-psychology as a discipline is concerned with the interaction of the mind and behavior with various forms of information communication technology. Not only email, the internet and social media, but also virtual reality, gaming and smart devices.
Eyes on the Target
The threat vector that we’re seeing are the same ones that you’re seeing frankly all over the news.
Cybersecurity and the next POTUS
Security is always going to play a big part in any political race in America.
Checking the NHS’s Security Pulse
Managing 40,000 devices across 500 sites is a huge challenge for any organization. But in the health sector added, mandatory security concerns make this even harder.
Penetrating the IT Dark Cloud
Cloud apps are revolutionizing enterprise IT, and their usage only continues to expand as businesses deploy them at a rapid pace. However, they also pose their own set of security risks
Security’s Ever-Growing, Ever-Moving Target
Portable platforms increasingly form the cornerstone of enterprises’ long-term strategic aims to be more flexible and agile. But how is security developing to prevent more threat vectors from being introduced?
Hacking the Cheaters
What does the Ashley Madison incident says about security and privacy in 2015
When Outsiders Become Insiders
Abuse of privileged access to systems is a growing cyber-threat, presenting an easier way in for hackers in many cases than traditional brute force attacks
Health, Safety and Security
Forget the bond of doctor-patient confidentiality, cyber-attacks pose a much bigger threat to your sensitive medical data, finds Wendy M. Grossman as she assesses the recent spate of healthcare breaches
Securing the Smart City
The smart city has long been the realm of science fiction. However, as dark fiber, big data and the internet of things start to converge, the reality is not as distant as it seems. But what are the security implications? Davey Winder investigates
Information Sharing: Better Together
Information sharing can be a win-win for public and private sectors, Phil Muncaster discovers, but there are still hurdles to overcome
NSA: Business as Usual
The NSA has experienced its biggest legislative setback in nearly 40 years – but there’s a fishy smell to it, reports Danny Bradbury
Windows Server 2003: End of the Road
It’s the end of Windows Server 2003 as we know it. Do you feel fine? asks Johna Till Johnson
Tales from the Crypt: Hardware vs Software
Encryption is never out of the spotlight in this industry, but the methods that businesses can deploy to encrypt their data are wide-ranging. Daniel Brecht examines the pros and cons of the various solutions on offer
The Rising Cost of Cyber-Insurance
You can insure yourself against cyber-attack, says Danny Bradbury, but be warned, prices are going up
Cybersecurity from Capitol Hill to Whitehall
Proclamations on cybersecurity and government surveillance have ignited political discourse in early 2015. Wendy M. Grossman cuts through the spin to find out what this means for technologists and citizens
Lizard Squad: Original Pranksters
Whether meddling kids or a serious menace, Lizard Squad is part of a phenomenon that is here to stay
Google vs Microsoft: Let the Patch Wars Commence
Phil Muncaster investigates whether an ongoing dispute between Google and Microsoft could change the way we fix security flaws in the future