Infosecurity Magazine Features

  1. A Guide to Managed Security

    The days when IT departments would purchase a separate in-house appliance for each security function are fading quickly. In its wake are vendors offering unified threat management packages, and cloud-based security-as-a-service. Ted Kritsonis discovers that the only real drawback to managed security is finding a provider you can trust

  2. A Work in Progress: Consolidation in the Security Market

    As the fog of worldwide recession lifts, cash flush security and hardware vendors have found themselves with money to burn. Stephen Pritchard examines how mergers and acquisitions are shaping the information security industry

  3. Welcoming Apple to the Malware Party

    Conventional wisdom says that, due to its smaller market share, the Mac OS X is far less susceptible to security threats than its operating system counterparts. But times are changing – along with Apple’s market share – which prompted Esther Shein to explore the myth that the Mac OS X is still immune to today’s malware threats

    1. Esther Shein

      Freelance Journalist

  4. The Anatomy of ID Theft

    There are several ways to hijack one’s identity in today’s world. Wendy M. Grossman explores a few of the possibilities, and some of the defense mechanisms

  5. Time to Get Smart About Portable Device Security

    Portable devices are smarter than ever, but can the same be said of users? Steve Durbin, global vice president of the Information Security Forum (ISF), discusses what information security professionals can do to ensure users appreciate – and address – the potential dangers of unsecured devices and risky usage outside the workplace

  6. iPads – to Bring or Not to Bring?

    Techies, early adopters, and your company’s executives – they are the front line of new consumer devices in the workplace. With the iPad being the hottest and most groundbreaking among them, Davey Winder wonders whether security professionals should tell their CEOs to leave that new tablet at home

  7. Tablet Security: A Bitter Pill

    Everyone wants a tablet, but securing them is a challenge, warns Danny Bradbury

  8. The Approaching Mobility Maelstrom

    Last year Drew Amorosi polled the Infosecurity editorial board on their predictions for 2011. This year he decided to broaden the sample and find out what the rest of the industry are talking about. What he received was an overdose of mobile security warnings

  9. A Superior (infosec) Education

    As the information security industry becomes more coveted, Wendy M. Grossman takes a look at the university courses available to aspiring and competing infosec professionals on both sides of the Atlantic

  10. Can Security and Privacy Co-exist?

    Should you have to give up privacy to get more security, or does one actually support the other? Danny Bradbury sounds out the experts

  11. The Good, the Bad, and the Ugly Insider Threats

    Whether intentional or unintentional, insider threats take many forms. The (ISC)² US Government Advisory Board Executive Writers Bureau examines this dichotomy and how it is being affected by both regulatory considerations, and the rapidly changing technology landscape

  12. Infosecurity: Do You Eat Your Own Dog Food?

    How many traffic policemen never exceed the speed limit when off duty? How many vicars don’t swear? And how many IT security professionals practice what they preach? No, seriously, do you eat your own dog food? That’s the question Davey Winder has been asking of infosec professionals in an attempt to determine just how secure security experts really are away from the office

  13. Compliance Strategies – A.K.A. Alphabet Soup

    Does your organization follow a recipe, or simply ‘eye-up’ the ingredients to your compliance tick boxes? Fred Donovan taste-tests what is often viewed as the unsavory side of the information security profession

  14. Paging Doctor Compliance

    With changes to the US healthcare system already underway – albeit at a snail’s pace – now is the perfect time to examine how the regulatory and compliance landscape may change with it. Esther Shein surveys the sector and seeks the proper prescription

    1. Esther Shein

      Freelance Journalist

  15. Year of the Hack

    Commonly referred to as the year of the hack, it is no secret what 2011 has become famous for in the information security industry. This year’s headlines, reports Fred Donovan, have been made up of data breaches, hacks, APT attacks and mergers and acquisitions

  16. State of Denial: The Chinese Cyber Threat

    Hackers exist almost anywhere there is an internet connection, yet the Chinese government continues to downplay their existence at home. Drew Amorosi takes a journey of enlightenment and seeks the truth

  17. Persistent and Evasive Attacks Uncovered

    APTs – and more recently AETs – have divided industry experts in opinion and often been used to scaremonger. Davey Winder reveals the truth behind the APT and AET headlines

  18. Breaking the Online Bank

    As technology and online behaviors change, so too do methods to compromise a person’s – or organization’s – most vital assets: their financial details. Ted Kritsonis examines how cyber thieves are adapting, and what the banks are doing to stop them

  19. Security Education: A Lesson Learned?

    Despite users being the most integral part of information security, only one to two percent of security budgets are being spent on awareness and education. Stephen Pritchard reports

  20. Obstacles Facing the US Cybersecurity Initiatives

    Although the US government is paying more attention than ever to the issue of cybersecurity, the recent battles in Washington over budgets and austerity measures mean that funding could potentially dry up in an instant. Fred Donovan surveys the experts to get their take on where the nation’s cybersecurity program is heading

What’s hot on Infosecurity Magazine?