Infosecurity Magazine Features
Q&A: Ken Pfeil, CISO, Pioneer Investments
Ken Pfeil of Pioneer Investments sat down with Infosecurity’s Drew Amorosi in Stamford, Connecticut, as the two covered a broad range of topics. Highlights include Windows XP end of life, vulnerability assessment, choosing the right technology, and how to evaluate potential technology vendors.
Comment: Total Internet Failure – When Online Goes Offline
KPMG’s Stephen Bonner highlights that complacency about the internet’s reliability is no excuse for the lack of a contingency plan
Bridging Information Security’s Enablement Gap
Information security has emerged from its geeky, niche technical origins to become an integral part of overall organizational strategy. Wendy M. Grossman details how the industry’s professionals continue evolving as business enablers
Comment: New Leadership Amidst Microsoft’s Identity Crisis
At a crossroads of generational shifts in computing and security threats, Vaultive’s Elad Yoran asks, can Microsoft adapt?
Duck and Cover: Defending Against DDoS Attacks
Denial-of-service attacks are frequently deployed, yet often organizations fail to prepare themselves against the threat. Ted Kritsonis talks to industry experts about using analytics to prevent and respond to DDoS attacks
Comment: Size Doesn’t Matter in the Battle Against Cybercrime
Despite having enough resources and dedicated, generous budgets to invest in the latest security solutions, large companies often fail to adequately secure their networks. When it comes to cybersecurity, Fujitsu’s David Robinson argues, large organizations face similar obstacles as their smaller counterparts
Tales of the Cyber Underground: The Blackshades Bust
In the latest Tales of the Cyber Underground instalment, Tom Brewster looks at the Blackshades bust and considers what it means for the future of cyber policing
Security Vendors and Their Technology: Working Better, Together
Business can be cutthroat, but when a company’s products are enlisted in the war against cyber-threats, it’s a battle that requires allied forces. Drew Amorosi talks to one security professional who underscores why cooperation and integration are increasingly becoming the norm among the security vendor community
Comment: Ethical Compromises in the Name of National Security
Support for secret systems of indiscriminate surveillance is incompatible with the ethical codes of the information security profession, as Geordie Stewart observes
The Internet of Things: The Good, The Bad, And Everything In Between
Theoretical physicist Michio Kaku predicts that computers, in the future, “will be everywhere and nowhere”. Join Wendy M. Grossman as she explores this Internet of Things to come
Life after Snowden
What will life on the internet look like, now that the cat is out of the bag? Danny Bradbury reports from the edge of a worrying new frontier
2013: The Year Hacktivism Fell?
At the close of 2012, McAfee claimed attacks by Anonymous would slow in 2013, and it appears the security firm’s prophecy was realized. Tom Brewster looks at the state of hacktivism after a turbulent year, finding it has become something different and possibly far more positive
BYOD: A Victim of its Own Success
Stephen Pritchard discovers the problems businesses face around BYOD, or bring your own device, are largely problems of success
Preparing for Europe's General Data Protection Regulation
Will it come, or will it go? Kevin Townsend discusses major roadblocks to the EU’s proposed data protection legislation, and how organizations can prepare
Cloud Security: A Crowded Standards Landscape?
Lacking a singular gold standard, the cloud security expanse can seem messy at times. But as Davey Winder discovers, it’s actually a form of controlled chaos
The Generation X, Y, Z of Information Security
Not all millennials approach privacy and security with the same attitudes. As Tom Brewster discovers, regardless of age, a one-sized-fits all approach to information security is not the solution
Financial Markets: A Playground for Cybercriminals
The financial markets are supposed to be transparent, and efficient. But what happens if cybercriminals begin playing with them, and would we even know it was happening? Danny Bradbury investigates
Secure Giving: Information Security Challenges in the Third Sector
Charities face all the same information security challenges as the public and private sectors, with a couple of extra to boot. Wendy M. Grossman speaks to third-sector CISOs to find out exactly how they are being targeted by shameless cybercriminals
A CEO’s Guide to Risk Management
General consensus suggests your organization will be breached, and will be hacked. But what risks are worth taking, and which risks have consequences so catastrophic that they are not? Stephen Pritchard investigates
Tackling the Authentication Problem
Why does authentication remain such a critical vulnerability for information security when there are so many regulatory initiatives and technical solutions attempting to address the problem? Davey Winder investigates the current state of play in the world of authentication