Infosecurity Magazine Features

  1. A CEO’s Guide to Securing from Within

    CyberArk’s Udi Mokady provides top tips on risk mitigation against internal and external threats for organizations

  2. Evolution of the Cybersecurity Professional

    Hord Tipton pays tribute to the data security victories over the last 10 years, but acknowledges it’s a never-ending struggle replete with immense challenges

  3. CISO Then (2003) and CISO Now (2013)

    The evolutionary speed of technology can be rivaled by few things. The role of the CISO might give it some competition though, concludes Todd Fitzgerald of (ISC)²

  4. Information Security: The Next Ten Years

    The information security industry is going to spend the next ten years solving the problems of the last twenty, finds Danny Bradbury

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  5. Let’s Hear it for the Ladies: Women in Information Security

    If information security is a man’s world – as it is so commonly declared – then how do you explain the wonderful women who continue to perform and succeed just as impressively as the next man? Eleanor Dallaway spoke to forty of the industry’s finest women about why they’re the minority, why they didn’t let that stop them, and what being a woman in technology means. This article is a canvas for their voice…

    1. Photo of Eleanor Dallaway

      Eleanor Dallaway

      Former Editorial Director & Tech Journalist

  6. The Cybersecurity Pipeline

    When it comes to educating the current and future information security workforce, the (ISC)² US Government Advisory Board Executive Writers Bureau asks: Where are universities in the flow?

  7. India’s Cybersecurity Challenge

    India has a big job on its hands as it tries to drive a culture of cybersecurity through a country of 1.2 billion people. Danny Bradbury reports on its progress

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  8. Hacking: Same Same but Different

    In a world of increasingly rapid technology development, Kevin Townsend explains why – generally speaking – hacking techniques have evolved at a slower pace

  9. The Funny Face of Information Security Education

    Can security and compliance education for end-users be both entertaining and informative? Drew Amorosi talks with one company seeking to accomplish both of these seemingly irreconcilable goals

  10. Cracking the Computer on Wheels

    Are the vehicles we drive the next target for hackers? Wendy M. Grossman steers us around the risks

    1. Wendy M. Grossman

      Contributing Writer

  11. Do the Right Thing… For a Price: The Market for Vulnerability Data

    The market for vulnerability data takes on three shades, depending on motive. As security researchers increasingly attempt to commoditize their findings, Davey Winder seeks to put a value on vulnerability information

    1. Davey Winder

  12. Parenting in the Information Age: A Practical Guide

    Research conducted in Hong Kong shows that blocking websites is no substitute for hands-on digital parenting. Former Hong Kong government CIO, Jeremy Godfrey, says governments should assist parents and teachers in getting up to speed, so they can help children have a positive and safe online experience

  13. Jailbroken Devices: the Good, the Bad, and BYOD

    The brand of ‘super geeks’ that typically jailbreak their mobile devices aren’t necessarily the threat they are often made out to be, Kevin Townsend explains. But with respect to security, permitting these devices within an enterprise setting can still be a risky proposition

  14. A CEO's Guide to Big Data Security

    Feeling a bit lost in the Big Data ocean? The ISF’s Steve Durbin provides a life boat by briefing the Big Chair about its security and risk management implications

  15. The Prognosis for Medical Device Security

    Medical devices can be hacked – but how much of a danger is it? Danny Bradbury asks the experts

  16. The Politics of Cybersecurity

    President Obama takes the law into his own hands by signing a recent executive order on cybersecurity for critical infrastructure. Drew Amorosi examines the implications

  17. Stepping Up the Banking Authentication Game

    How are banks and card issuers adapting their customer authentication methods to keep up with changes in technology? Ted Kritsonis investigates…

  18. Out In Front: Speed’s Role in Information Security

    Speed is critical to battles in the world of information security. Sarb Sembhi explores how security professionals can claim back some lost ground

  19. Data Breach Battle Lines

    Employee negligence is often blamed for being the root of many information security incidents. Lauren Moraski finds that although these claims are not without merit, more often the enemy still lies outside the fortress walls

  20. Auditors: Friend or Foe?

    Wendy M. Grossman examines the unique and oftentimes uncomfortable relationship between organizations and their auditors

What’s hot on Infosecurity Magazine?