Infosecurity Magazine Features
Crossing Borders: The Right Side of Wrong?
Most nations consider travel data to be crucial to protecting national security. How that data is collected, stored, and secured however seems to be a closely guarded secret. Wendy M. Grossman investigates
The Spy Who Hacked Me
James Bond was more of a jock than a nerd, and he probably wouldn’t have known how to use a computer, says Danny Bradbury. How things have changed…
What Is Critical to Your Infrastructure?
Critical infrastructure means many things to many people. Adrian Davis, principal research analyst with the Information Security Forum (ISF), explains why determining which infrastructure elements are critical to a business is the first step in keeping them safe
The State of Smartphone Security
An awful lot of lip service has been paid to smartphone security. Whereas most industry experts agree that, to date at least, smartphone security threats are mainly hype, that doesn’t mean this won’t change. Davey Winder investigates…
Security Vendors: Trend-Setters, or Trend Followers?
How far ahead of the curve – or behind it – are vendors when it comes to identifying security trends? Danny Bradbury finds out that the curve may not matter at all
Phone Hacking Scandal: Who's Getting the Message?
In the wake of the tabloid cellphone hacking scandal, have operators really closed all the loopholes that let snoopers intercept our communications? Jim Mortleman investigates
Please Feed the Bear: The Growing Russian Infosec Market
The Russian information security market is thriving, fueled by a rise in cybercrime. Some foreign security firms, however, have found it difficult to break into the market. Fred Donovan explains why
Cashing in on Security Training
At long last, a cybersecurity career field has emerged. The (ISC)² US Government Advisory Board Executive Writers Bureau examines where employment opportunities lie and how much you can expect to be paid in this very important sector
Anti-virus: Is There Life in the Old Dog?
Once upon a time, anti-virus technology was a well-coveted standalone product. These days, it is often considered a commodity that can be adequately built into a UTM offering. Cath Everett investigates whether or not a market for standalone anti-virus technology still exists
The Truth About DLP
Data loss prevention: the term that fills marketing managers with joy, and infosec managers with dread. Preventing a data leak may be the top priority for the IT security team, but is DLP technology mature, and cost effective enough, to be the answer? Stephen Pritchard reports
Biometrics: How and Now?
Using biometric data for identity access and management can be a controversial move. Esther Shein examines the drawbacks, and looks at where and how biometrics are currently being used
A Rotting Security Apple?
Vendors, analysts, and commentators alike have long predicted a surge in malware affecting Apple’s products. Yet, until recently, these prognostications have failed to materialize. Drew Amorosi examines recent malware threats to Apple’s OS X operating system to find out if this is an anomaly, or a sign of things to come
Does it Matter if It’s Black or White(listing)?
While many experts agree that whitelisting provides superior security to that of its antonym, blacklisting, there are concerns over its practicality and usability. Kevin Townsend puts the technologies head to head
All Eyes on CSI: Cyberspace
In an ever-changing world, the way crimes are committed, and subsequently investigated, must also change. Lauren Moraski takes us inside the world of modern-day cybercrime forensic investigation
A Day in the Life of a CISO
CISOs rarely have a typical day, but they all face similar challenges. Danny Bradbury explores some of them
Seven Crucial Infosec Career Steps
The (ISC)² US Government Advisory Board Executive Writers Bureau shares its wisdom and experiences from the perspective of career-IT and IT security professionals by focusing on the keys to a successful career. Read on for advice on how younger professionals can get the best out of this rewarding profession
The CISO Pilgrimage
In much the same way that the role of a CISO has evolved, so has the journey to get there. Wendy M. Grossman looks at what steps an aspiring CISO must take to get themselves from school to the board room
Researching the Security Researchers
The security industry doesn’t have it easy. For every virus it detects and prevents, several new ones are being designed for maximum impact and damage. Information security researchers are up against a deluge of malware writers. Wendy M. Grossman reports on how they keep up
The Infosec Market in China: Proceed with Caution
Set to become the second largest economy in the world, China has the money and the people to make information security companies very profitable indeed. Kevin Townsend investigates the Chinese data and privacy culture and the regulations that make ‘cracking’ China a huge challenge for information security businesses
Phishing for Chips: Why the Online Gambling Industry is Odds-On to Beat Cybercrime
While online gamers might not consider information security a priority, online gambling operators are very much aware that their sites are great big targets for cybercriminals. Davey Winder asks what online gaming sites are doing to secure themselves, and their customers, against a rising tide of cybercrime?