Infosecurity Magazine Features
A CEO's Guide to Information Security Compliance
Does your chief executive need a crash course in information security compliance and risk management? Stephen Pritchard provides them with a brief primer
Security’s Steering Force
Is the information security industry driven by compliance, or security? Kevin Townsend seeks out the answer
Hack to the Future
Hacktivism has been around for at least 20 years. Danny Bradbury takes a peek inside the community and finds out how it is evolving
The Dark Side of Cryptography: Kleptography in Black-Box Implementations
Hardware security modules (HSMs) and other black-box implementations aim to keep valuable cryptographic keys secure. However, these devices can be subverted to turn their cryptographic algorithms into subliminal channels that grant unwarranted access to presumably secured data, as the authors demonstrate.
Two Payment Worlds Collide
Is there a crisis of convergence in the online and offline worlds of transactional security? Davey Winder investigates...
Privacy: Your Best Case for Security?
Jim Mortleman shows why doing the ‘right thing’ with respect to data privacy is more than a compliance necessity. It can help your organization save money while avoiding costly headlines
The Insecurity of Security: A Hacking Retrospective
Take a stroll through recent history, as John Walker reviews the origins of hacking and how it arrived at where it is today
Intelligent Design: The Evolution of Security Technology
Information security threats are highly adaptive to environmental realities. Wendy M. Grossman examines whether the security industry’s technology is evolving as forward-thinking, or simply responding to today’s challenges
A Risk Management-based Look at the Infosec Skills Gap
The (ISC)² US Government Advisory Board Executive Writers Bureau explores a broader perspective of the skills gap challenge and addresses why a wide range of knowledge and skill – from junior technical levels to senior management – is needed to adequately meet the demands
The Changing Role of Security Professionals
John Pironti discusses the new skills that industry professionals must acquire to keep pace in an increasingly cloudy and mobile world
Higher Learning: Information Security on Campus
Danny Bradbury goes back to school and discovers that educational institutions face a unique set of security challenges
In Windows We Trust
Drew Amorosi calls in the experts to evaluate security features of Microsoft’s new Windows 8 operating system
Policing the Internet: The Players Take the Stage
The (ISC)² US Government Advisory Board Executive Writers Bureau highlights the roles that various actors play in helping create a safer internet – and the opposition they encounter
Finding Safety in the Cloud
Are you lost in a sea of cloud computing possibilities? Ted Kritsonis helps organizations navigate risks along the journey
It's Raining Apps
The deluge of apps at end-users’ disposal grows larger each day. Stephen Pritchard provides cover for organizations looking to address software vulnerabilities as the cloud and mobile take over
How Secure Are Contactless Payments?
Does wireless necessarily equate to insecure in the world of payment transactions? Davey Winder examines the fears, and the realities
A Sick Patient: Data Security in the Healthcare Sector
The privacy and security of healthcare data needs some serious work, says Danny Bradbury. How did we get into this mess, and how can we get out of it?
Responding to a Data Breach
So, you’ve already figured out that your organization is the victim of a data breach. Conrad Constantine explains what your next steps should be
Data Breach Insurance: Underwriting your Liabilities
As high-profile data loss incidents become commonplace, Wendy M. Grossman examines the nascent field of data breach insurance aiming to hedge against the risks
The Cloud Gives, Takes Away, and Gives Back Again
How far would someone go to take over another person’s Twitter account? Drew Amorosi finds out that in the case of Mat Honan, senior writer for Wired, it appears to be great lengths