Infosecurity Magazine Features

  1. Comprehensive Cybersecurity: Securing the Human Operating System

    In honor of National Cybersecuirty Awareness month in the US, Eric Cole of the SANS Institute highlights the role of people in any comprehensive security program

  2. SCADA Security Inertia

    It’s no secret that SCADA systems are vulnerable to compromise, and the tools to mitigate many of the vulnerabilities are within reach. Yet, as Fred Donovan discovers, the vendors that supply these systems are often slow to react to the security issues

  3. Application Forecast: Partly Cloudy

    With the market for cloud-based applications exploding, Stephen Pritchard tells security professionals what they need to know about software-as-a-service

  4. Hard, Soft, or Smart? Evaluating the Two-Factor Authentication Options

    Engineer and researcher Grant Le Brun evaluates the current landscape for two-factor authentication

  5. The Potential Weaknesses in a Virtualized Infrastructure

    IEEE’s Kevin Curran examines the weak points of virtualized infrastructures and the solutions everyone should consider

  6. The Growing Movement in Social Responsibility

    Julie Peeler, director of the (ISC)² Foundation, examines how the IT security community is prioritizing its contribution to society

  7. Should You Give Biometrics a Break?

    Biometric identification has been around for more than 100 years. Davey Winder investigates its relevance and feasibility for the IT security world today

  8. Looking Good on Paper

    Take note when warned of digital data loss, says Danny Bradbury – but don’t forget to secure your paper-based documents. It may be harder than you think

  9. Stoking the Flames of Cyber War

    Call it Flame, Flamer, sKyWIPer, or Stuxnet’s father – the labels simply don’t matter. Drew Amorosi concludes that one well-crafted piece of malware can be more valuable than a thousand secret agents

  10. Security’s Alleged Disappearing Act

    Recent acquisitions in the market have given rise to the notion of embedded security, rather than security as an add-on layer. Wendy M. Grossman discovers that this is only one of many trends shaping the future of data protection

  11. Watching Big Brother: The Hypocrisy of Internet Censorship

    State-level censorship of the internet is becoming more common and easier to achieve. But it’s not only the populations of undemocratic countries who should be worried, finds Jim Mortleman

  12. Battling the Underground World of Cybercrime

    The cybercrime black market can be unruly and often unreachable. Ted Kritsonis examines what modern-day versions of Eliot Ness are doing to confront the situation

  13. Building a Resilient Cyber Response

    When it comes to cyber attacks, a carefully formulated response may be just as critical as efforts to prevent them. The Information Security Forum’s Michael de Crespigny says resilience is the key when defenses fail

  14. The US vs. China: A Very Civil (Cyber) War

    Is China conducting a silent electronic war with the US? Sure, says Danny Bradbury – but so is everyone else

  15. Critical Infrastructure Mania

    What do classic Beatles songs and protecting critical infrastructure have in common? Come join Fred Donovan on this ‘Magical Mystery Tour’ to find out

  16. The 'Perception' of DLP

    Think you can purchase the latest application and all of your data loss worries will disappear? Think again, says John Walker. To this security expert, DLP is about more than technology

  17. Follow the Money: The Economics of Fake Anti-virus

    Fake anti-virus remains a high-level threat for the most vulnerable of computer users. Danny Bradbury tracks the money

  18. Let’s Get This BYOD Office Party Started

    The most dangerous security aspect of BYOD, according to many experts, is the apps that personal devices run, not the operating system or hardware. Fred Donovan examines how organizations can say ‘yes’ to employee-owned devices while still maintaining control of their data

  19. Preventing an Olympic-sized Disaster

    With the London 2012 Olympics almost upon us, Stephen Pritchard looks at the wider impact that the Games may have on London and the UK’s infrastructure. He finds that networks, businesses, transportation and remote working are all causes for concern

  20. The Web of Piracy

    Proposals to curb online piracy in the US boiled over into high-profile digital protests this past winter. Drew Amorosi examines what the fuss is all about

What’s hot on Infosecurity Magazine?