Infosecurity Magazine Features
A CEO’s Guide to Securing from Within
CyberArk’s Udi Mokady provides top tips on risk mitigation against internal and external threats for organizations
Evolution of the Cybersecurity Professional
Hord Tipton pays tribute to the data security victories over the last 10 years, but acknowledges it’s a never-ending struggle replete with immense challenges
CISO Then (2003) and CISO Now (2013)
The evolutionary speed of technology can be rivaled by few things. The role of the CISO might give it some competition though, concludes Todd Fitzgerald of (ISC)²
Information Security: The Next Ten Years
The information security industry is going to spend the next ten years solving the problems of the last twenty, finds Danny Bradbury
Let’s Hear it for the Ladies: Women in Information Security
If information security is a man’s world – as it is so commonly declared – then how do you explain the wonderful women who continue to perform and succeed just as impressively as the next man? Eleanor Dallaway spoke to forty of the industry’s finest women about why they’re the minority, why they didn’t let that stop them, and what being a woman in technology means. This article is a canvas for their voice…
The Cybersecurity Pipeline
When it comes to educating the current and future information security workforce, the (ISC)² US Government Advisory Board Executive Writers Bureau asks: Where are universities in the flow?
India’s Cybersecurity Challenge
India has a big job on its hands as it tries to drive a culture of cybersecurity through a country of 1.2 billion people. Danny Bradbury reports on its progress
Hacking: Same Same but Different
In a world of increasingly rapid technology development, Kevin Townsend explains why – generally speaking – hacking techniques have evolved at a slower pace
The Funny Face of Information Security Education
Can security and compliance education for end-users be both entertaining and informative? Drew Amorosi talks with one company seeking to accomplish both of these seemingly irreconcilable goals
Cracking the Computer on Wheels
Are the vehicles we drive the next target for hackers? Wendy M. Grossman steers us around the risks
Do the Right Thing… For a Price: The Market for Vulnerability Data
The market for vulnerability data takes on three shades, depending on motive. As security researchers increasingly attempt to commoditize their findings, Davey Winder seeks to put a value on vulnerability information
Parenting in the Information Age: A Practical Guide
Research conducted in Hong Kong shows that blocking websites is no substitute for hands-on digital parenting. Former Hong Kong government CIO, Jeremy Godfrey, says governments should assist parents and teachers in getting up to speed, so they can help children have a positive and safe online experience
Jailbroken Devices: the Good, the Bad, and BYOD
The brand of ‘super geeks’ that typically jailbreak their mobile devices aren’t necessarily the threat they are often made out to be, Kevin Townsend explains. But with respect to security, permitting these devices within an enterprise setting can still be a risky proposition
A CEO's Guide to Big Data Security
Feeling a bit lost in the Big Data ocean? The ISF’s Steve Durbin provides a life boat by briefing the Big Chair about its security and risk management implications
The Prognosis for Medical Device Security
Medical devices can be hacked – but how much of a danger is it? Danny Bradbury asks the experts
The Politics of Cybersecurity
President Obama takes the law into his own hands by signing a recent executive order on cybersecurity for critical infrastructure. Drew Amorosi examines the implications
Stepping Up the Banking Authentication Game
How are banks and card issuers adapting their customer authentication methods to keep up with changes in technology? Ted Kritsonis investigates…
Out In Front: Speed’s Role in Information Security
Speed is critical to battles in the world of information security. Sarb Sembhi explores how security professionals can claim back some lost ground
Data Breach Battle Lines
Employee negligence is often blamed for being the root of many information security incidents. Lauren Moraski finds that although these claims are not without merit, more often the enemy still lies outside the fortress walls
Auditors: Friend or Foe?
Wendy M. Grossman examines the unique and oftentimes uncomfortable relationship between organizations and their auditors