Infosecurity Magazine Features

  1. A CEO's Guide to Information Security Compliance

    Does your chief executive need a crash course in information security compliance and risk management? Stephen Pritchard provides them with a brief primer

  2. Security’s Steering Force

    Is the information security industry driven by compliance, or security? Kevin Townsend seeks out the answer

  3. Hack to the Future

    Hacktivism has been around for at least 20 years. Danny Bradbury takes a peek inside the community and finds out how it is evolving

  4. The Dark Side of Cryptography: Kleptography in Black-Box Implementations

    Hardware security modules (HSMs) and other black-box implementations aim to keep valuable cryptographic keys secure. However, these devices can be subverted to turn their cryptographic algorithms into subliminal channels that grant unwarranted access to presumably secured data, as the authors demonstrate.

  5. Two Payment Worlds Collide

    Is there a crisis of convergence in the online and offline worlds of transactional security? Davey Winder investigates...

  6. Privacy: Your Best Case for Security?

    Jim Mortleman shows why doing the ‘right thing’ with respect to data privacy is more than a compliance necessity. It can help your organization save money while avoiding costly headlines

  7. The Insecurity of Security: A Hacking Retrospective

    Take a stroll through recent history, as John Walker reviews the origins of hacking and how it arrived at where it is today

  8. Intelligent Design: The Evolution of Security Technology

    Information security threats are highly adaptive to environmental realities. Wendy M. Grossman examines whether the security industry’s technology is evolving as forward-thinking, or simply responding to today’s challenges

  9. A Risk Management-based Look at the Infosec Skills Gap

    The (ISC)² US Government Advisory Board Executive Writers Bureau explores a broader perspective of the skills gap challenge and addresses why a wide range of knowledge and skill – from junior technical levels to senior management – is needed to adequately meet the demands

  10. The Changing Role of Security Professionals

    John Pironti discusses the new skills that industry professionals must acquire to keep pace in an increasingly cloudy and mobile world

  11. Higher Learning: Information Security on Campus

    Danny Bradbury goes back to school and discovers that educational institutions face a unique set of security challenges

  12. In Windows We Trust

    Drew Amorosi calls in the experts to evaluate security features of Microsoft’s new Windows 8 operating system

  13. Policing the Internet: The Players Take the Stage

    The (ISC)² US Government Advisory Board Executive Writers Bureau highlights the roles that various actors play in helping create a safer internet – and the opposition they encounter

  14. Finding Safety in the Cloud

    Are you lost in a sea of cloud computing possibilities? Ted Kritsonis helps organizations navigate risks along the journey

  15. It's Raining Apps

    The deluge of apps at end-users’ disposal grows larger each day. Stephen Pritchard provides cover for organizations looking to address software vulnerabilities as the cloud and mobile take over

  16. How Secure Are Contactless Payments?

    Does wireless necessarily equate to insecure in the world of payment transactions? Davey Winder examines the fears, and the realities

  17. A Sick Patient: Data Security in the Healthcare Sector

    The privacy and security of healthcare data needs some serious work, says Danny Bradbury. How did we get into this mess, and how can we get out of it?

  18. Responding to a Data Breach

    So, you’ve already figured out that your organization is the victim of a data breach. Conrad Constantine explains what your next steps should be

  19. Data Breach Insurance: Underwriting your Liabilities

    As high-profile data loss incidents become commonplace, Wendy M. Grossman examines the nascent field of data breach insurance aiming to hedge against the risks

  20. The Cloud Gives, Takes Away, and Gives Back Again

    How far would someone go to take over another person’s Twitter account? Drew Amorosi finds out that in the case of Mat Honan, senior writer for Wired, it appears to be great lengths

What’s hot on Infosecurity Magazine?