Infosecurity Magazine Features

  1. Information Security: Read All About It

    Ill news travels quick and far, or so the saying goes. But how well is security-related news covered in the press, and what are people writing about? Danny Bradbury investigates

  2. State of the nation: critical national infrastructure

    What state is the UK critical national infrastructure actually in? What dangers does it face? Are the UK’s CNI safeguards robust enough to withstand the latest attack scenarios? Davey Winder investigates what the likely consequences would be should the new government administration do nothing, or worse, cut back spending in the area of CNI defences

  3. Taking Down a Botnet

    This past February, Microsoft, along with industry partners and academic researchers, spearheaded an effort to take the Waledec botnet offline. Drew Amorosi provides a detailed account of just how the cooperative endeavor was able to halt – at least temporarily – the notorious spam serving network.

  4. DLP technology unplugged

    Data loss prevention (DLP) technology has become something of a buzzword amongst security analysts, but where has it come from, where does it sit in the market as a whole and what does the future hold? Davey Winder investigates

  5. Like Falling Off a Log

    System logs haven’t really changed since the days of the IBM 360, but the need to manage them effectively for security purposes certainly has. Danny Bradbury finds out why log management is so important – and why we aren’t doing it properly

  6. Social engineering: Re-defining the human factor

    Social engineering is a recent phenomenon designed to steal information from unsuspecting users and organisations. Raj Samani examines aspects of the practice and what those with access to this data can do to protect it.

  7. A Breach too Far

    How much do data breaches really damage organizations financially – and why don’t we want to hear about it? Danny Bradbury investigates

  8. Grading Obama on Cybersecurity

    Early in his term, President Obama promised to address the issue of cybersecurity by continuing and even expanding upon the efforts of the previous administration. Lauren Moraski surveys experts in the field, providing an assessment of the job the new president is doing so far to address this issue

  9. Financial services security changes with the times

    Tense economic times and insider malfeasance have provided a steady stream of data breach incidents for firms both large and small. Stephen Pritchard examines what financial services providers are doing to protect their customers’ money – and information – from prying eyes

  10. Security on a shoestring: How to get more for less in a recession

    While budgets are still being applied to information security, the demand for ‘more for less’ is keeping vendors on their toes. Kevin Townsend advises on how to achieve greater security at less cost

  11. Securing Electronic Health Records

    Electronic health records are supposed to improve the efficiency and accuracy of healthcare delivery. However, with electronic records come security headaches, and the potential for data breaches. John Sterlicchi examines what the industry is doing thus far to facilitate a secure transition toward electronic health records

  12. Keeping it real: Updating your security policy in 2010

    Great standards now exist for drafting security policies, but how do you make it real among corporate populations beset by recession, up for the outsourcing chop, and addicted to Facebook? Brian McKenna reports

  13. Anatomy of a CISO

    Have you ever wondered what your boss does all day long to earn that lucrative salary? For those of you who yearn for the top seat, Davey Winder reveals what it’s like to live a day in the life of an average CISO

  14. Cyber-bullying plagues workplace

    While the worrying growth of cyber-bullying is brought to our attention through media coverage and awareness campaigns, cyber-bullying within the workplace is more sparsely covered. Eleanor Dallaway talks to the managing director of CQR Consulting, David Simpson, to get to the heart of the problem

  15. The changing nature of the information security career

    It is often the case that the job we currently do has evolved from something that would be unrecognisable just 10 years before. John Colley, managing director EMEA for (ISC)², examines the progression of infosec careers over the past few decades, and makes some predictions about how the profession will evolve going forward

  16. Free anti-virus software dominates market

    With more than one hundred million users, it’s fair to say that Avast!’s ‘free anti-virus’ model is working nicely. It’s the paid for anti-virus model, adopted by the likes of Symantec and Kaspersky, that is struggling to keep its head above water, argues Vincent Steckler, the Avast! CEO…

  17. Searching for Security

    With more than 30 000 web pages being compromised every day, search engine results could increasingly lead to malware infection. Kari Larsen asks what the search engines are doing to mitigate security threats, and how users can protect themselves

  18. Espionage in sport

    Where there’s money, there’s cybercrime, and sport is no exception. Stephen Pritchard examines the pitfalls and vulnerabilities that the sporting industry faces in securing its vital information

  19. Music File-Sharing Enters a New Decade

    The recording industry continues to lose billions of dollars each year, along with tens of thousands of jobs, all thanks to illegally downloaded files. Lauren Moraski examines what is being done to combat the drain on this sector

  20. The charmed life of cybercrime

    Crimes, scams, and various forms of nonsense are hardly inventions of the digital age. In fact, they are likely as old as human civilisation. Wendy M. Grossman examines why criminals are finding it easier to engage in cybercrime over more traditional forms of physical theft, and why law enforcement finds it difficult to prosecute the perpetrators

What’s hot on Infosecurity Magazine?