Infosecurity Magazine Features

  1. Crossing Borders: The Right Side of Wrong?

    Most nations consider travel data to be crucial to protecting national security. How that data is collected, stored, and secured however seems to be a closely guarded secret. Wendy M. Grossman investigates

  2. The Spy Who Hacked Me

    James Bond was more of a jock than a nerd, and he probably wouldn’t have known how to use a computer, says Danny Bradbury. How things have changed…

  3. What Is Critical to Your Infrastructure?

    Critical infrastructure means many things to many people. Adrian Davis, principal research analyst with the Information Security Forum (ISF), explains why determining which infrastructure elements are critical to a business is the first step in keeping them safe

  4. The State of Smartphone Security

    An awful lot of lip service has been paid to smartphone security. Whereas most industry experts agree that, to date at least, smartphone security threats are mainly hype, that doesn’t mean this won’t change. Davey Winder investigates…

  5. Security Vendors: Trend-Setters, or Trend Followers?

    How far ahead of the curve – or behind it – are vendors when it comes to identifying security trends? Danny Bradbury finds out that the curve may not matter at all

  6. Phone Hacking Scandal: Who's Getting the Message?

    In the wake of the tabloid cellphone hacking scandal, have operators really closed all the loopholes that let snoopers intercept our communications? Jim Mortleman investigates

  7. Please Feed the Bear: The Growing Russian Infosec Market

    The Russian information security market is thriving, fueled by a rise in cybercrime. Some foreign security firms, however, have found it difficult to break into the market. Fred Donovan explains why

  8. Cashing in on Security Training

    At long last, a cybersecurity career field has emerged. The (ISC)² US Government Advisory Board Executive Writers Bureau examines where employment opportunities lie and how much you can expect to be paid in this very important sector

  9. Anti-virus: Is There Life in the Old Dog?

    Once upon a time, anti-virus technology was a well-coveted standalone product. These days, it is often considered a commodity that can be adequately built into a UTM offering. Cath Everett investigates whether or not a market for standalone anti-virus technology still exists

  10. The Truth About DLP

    Data loss prevention: the term that fills marketing managers with joy, and infosec managers with dread. Preventing a data leak may be the top priority for the IT security team, but is DLP technology mature, and cost effective enough, to be the answer? Stephen Pritchard reports

  11. Biometrics: How and Now?

    Using biometric data for identity access and management can be a controversial move. Esther Shein examines the drawbacks, and looks at where and how biometrics are currently being used

  12. A Rotting Security Apple?

    Vendors, analysts, and commentators alike have long predicted a surge in malware affecting Apple’s products. Yet, until recently, these prognostications have failed to materialize. Drew Amorosi examines recent malware threats to Apple’s OS X operating system to find out if this is an anomaly, or a sign of things to come

  13. Does it Matter if It’s Black or White(listing)?

    While many experts agree that whitelisting provides superior security to that of its antonym, blacklisting, there are concerns over its practicality and usability. Kevin Townsend puts the technologies head to head

  14. All Eyes on CSI: Cyberspace

    In an ever-changing world, the way crimes are committed, and subsequently investigated, must also change. Lauren Moraski takes us inside the world of modern-day cybercrime forensic investigation

  15. A Day in the Life of a CISO

    CISOs rarely have a typical day, but they all face similar challenges. Danny Bradbury explores some of them

  16. Seven Crucial Infosec Career Steps

    The (ISC)² US Government Advisory Board Executive Writers Bureau shares its wisdom and experiences from the perspective of career-IT and IT security professionals by focusing on the keys to a successful career. Read on for advice on how younger professionals can get the best out of this rewarding profession

  17. The CISO Pilgrimage

    In much the same way that the role of a CISO has evolved, so has the journey to get there. Wendy M. Grossman looks at what steps an aspiring CISO must take to get themselves from school to the board room

  18. Researching the Security Researchers

    The security industry doesn’t have it easy. For every virus it detects and prevents, several new ones are being designed for maximum impact and damage. Information security researchers are up against a deluge of malware writers. Wendy M. Grossman reports on how they keep up

  19. The Infosec Market in China: Proceed with Caution

    Set to become the second largest economy in the world, China has the money and the people to make information security companies very profitable indeed. Kevin Townsend investigates the Chinese data and privacy culture and the regulations that make ‘cracking’ China a huge challenge for information security businesses

  20. Phishing for Chips: Why the Online Gambling Industry is Odds-On to Beat Cybercrime

    While online gamers might not consider information security a priority, online gambling operators are very much aware that their sites are great big targets for cybercriminals. Davey Winder asks what online gaming sites are doing to secure themselves, and their customers, against a rising tide of cybercrime?

What’s hot on Infosecurity Magazine?