Infosecurity Magazine Features
A Guide to Managed Security
The days when IT departments would purchase a separate in-house appliance for each security function are fading quickly. In its wake are vendors offering unified threat management packages, and cloud-based security-as-a-service. Ted Kritsonis discovers that the only real drawback to managed security is finding a provider you can trust
A Work in Progress: Consolidation in the Security Market
As the fog of worldwide recession lifts, cash flush security and hardware vendors have found themselves with money to burn. Stephen Pritchard examines how mergers and acquisitions are shaping the information security industry
Welcoming Apple to the Malware Party
Conventional wisdom says that, due to its smaller market share, the Mac OS X is far less susceptible to security threats than its operating system counterparts. But times are changing – along with Apple’s market share – which prompted Esther Shein to explore the myth that the Mac OS X is still immune to today’s malware threats
The Anatomy of ID Theft
There are several ways to hijack one’s identity in today’s world. Wendy M. Grossman explores a few of the possibilities, and some of the defense mechanisms
Time to Get Smart About Portable Device Security
Portable devices are smarter than ever, but can the same be said of users? Steve Durbin, global vice president of the Information Security Forum (ISF), discusses what information security professionals can do to ensure users appreciate – and address – the potential dangers of unsecured devices and risky usage outside the workplace
iPads – to Bring or Not to Bring?
Techies, early adopters, and your company’s executives – they are the front line of new consumer devices in the workplace. With the iPad being the hottest and most groundbreaking among them, Davey Winder wonders whether security professionals should tell their CEOs to leave that new tablet at home
Tablet Security: A Bitter Pill
Everyone wants a tablet, but securing them is a challenge, warns Danny Bradbury
The Approaching Mobility Maelstrom
Last year Drew Amorosi polled the Infosecurity editorial board on their predictions for 2011. This year he decided to broaden the sample and find out what the rest of the industry are talking about. What he received was an overdose of mobile security warnings
A Superior (infosec) Education
As the information security industry becomes more coveted, Wendy M. Grossman takes a look at the university courses available to aspiring and competing infosec professionals on both sides of the Atlantic
Can Security and Privacy Co-exist?
Should you have to give up privacy to get more security, or does one actually support the other? Danny Bradbury sounds out the experts
The Good, the Bad, and the Ugly Insider Threats
Whether intentional or unintentional, insider threats take many forms. The (ISC)² US Government Advisory Board Executive Writers Bureau examines this dichotomy and how it is being affected by both regulatory considerations, and the rapidly changing technology landscape
Infosecurity: Do You Eat Your Own Dog Food?
How many traffic policemen never exceed the speed limit when off duty? How many vicars don’t swear? And how many IT security professionals practice what they preach? No, seriously, do you eat your own dog food? That’s the question Davey Winder has been asking of infosec professionals in an attempt to determine just how secure security experts really are away from the office
Compliance Strategies – A.K.A. Alphabet Soup
Does your organization follow a recipe, or simply ‘eye-up’ the ingredients to your compliance tick boxes? Fred Donovan taste-tests what is often viewed as the unsavory side of the information security profession
Paging Doctor Compliance
With changes to the US healthcare system already underway – albeit at a snail’s pace – now is the perfect time to examine how the regulatory and compliance landscape may change with it. Esther Shein surveys the sector and seeks the proper prescription
Year of the Hack
Commonly referred to as the year of the hack, it is no secret what 2011 has become famous for in the information security industry. This year’s headlines, reports Fred Donovan, have been made up of data breaches, hacks, APT attacks and mergers and acquisitions
State of Denial: The Chinese Cyber Threat
Hackers exist almost anywhere there is an internet connection, yet the Chinese government continues to downplay their existence at home. Drew Amorosi takes a journey of enlightenment and seeks the truth
Persistent and Evasive Attacks Uncovered
APTs – and more recently AETs – have divided industry experts in opinion and often been used to scaremonger. Davey Winder reveals the truth behind the APT and AET headlines
Breaking the Online Bank
As technology and online behaviors change, so too do methods to compromise a person’s – or organization’s – most vital assets: their financial details. Ted Kritsonis examines how cyber thieves are adapting, and what the banks are doing to stop them
Security Education: A Lesson Learned?
Despite users being the most integral part of information security, only one to two percent of security budgets are being spent on awareness and education. Stephen Pritchard reports
Obstacles Facing the US Cybersecurity Initiatives
Although the US government is paying more attention than ever to the issue of cybersecurity, the recent battles in Washington over budgets and austerity measures mean that funding could potentially dry up in an instant. Fred Donovan surveys the experts to get their take on where the nation’s cybersecurity program is heading