Infosecurity Magazine Features
Information Security: Read All About It
Ill news travels quick and far, or so the saying goes. But how well is security-related news covered in the press, and what are people writing about? Danny Bradbury investigates
State of the nation: critical national infrastructure
What state is the UK critical national infrastructure actually in? What dangers does it face? Are the UK’s CNI safeguards robust enough to withstand the latest attack scenarios? Davey Winder investigates what the likely consequences would be should the new government administration do nothing, or worse, cut back spending in the area of CNI defences
Taking Down a Botnet
This past February, Microsoft, along with industry partners and academic researchers, spearheaded an effort to take the Waledec botnet offline. Drew Amorosi provides a detailed account of just how the cooperative endeavor was able to halt – at least temporarily – the notorious spam serving network.
DLP technology unplugged
Data loss prevention (DLP) technology has become something of a buzzword amongst security analysts, but where has it come from, where does it sit in the market as a whole and what does the future hold? Davey Winder investigates
Like Falling Off a Log
System logs haven’t really changed since the days of the IBM 360, but the need to manage them effectively for security purposes certainly has. Danny Bradbury finds out why log management is so important – and why we aren’t doing it properly
Social engineering: Re-defining the human factor
Social engineering is a recent phenomenon designed to steal information from unsuspecting users and organisations. Raj Samani examines aspects of the practice and what those with access to this data can do to protect it.
A Breach too Far
How much do data breaches really damage organizations financially – and why don’t we want to hear about it? Danny Bradbury investigates
Grading Obama on Cybersecurity
Early in his term, President Obama promised to address the issue of cybersecurity by continuing and even expanding upon the efforts of the previous administration. Lauren Moraski surveys experts in the field, providing an assessment of the job the new president is doing so far to address this issue
Financial services security changes with the times
Tense economic times and insider malfeasance have provided a steady stream of data breach incidents for firms both large and small. Stephen Pritchard examines what financial services providers are doing to protect their customers’ money – and information – from prying eyes
Security on a shoestring: How to get more for less in a recession
While budgets are still being applied to information security, the demand for ‘more for less’ is keeping vendors on their toes. Kevin Townsend advises on how to achieve greater security at less cost
Securing Electronic Health Records
Electronic health records are supposed to improve the efficiency and accuracy of healthcare delivery. However, with electronic records come security headaches, and the potential for data breaches. John Sterlicchi examines what the industry is doing thus far to facilitate a secure transition toward electronic health records
Keeping it real: Updating your security policy in 2010
Great standards now exist for drafting security policies, but how do you make it real among corporate populations beset by recession, up for the outsourcing chop, and addicted to Facebook? Brian McKenna reports
Anatomy of a CISO
Have you ever wondered what your boss does all day long to earn that lucrative salary? For those of you who yearn for the top seat, Davey Winder reveals what it’s like to live a day in the life of an average CISO
Cyber-bullying plagues workplace
While the worrying growth of cyber-bullying is brought to our attention through media coverage and awareness campaigns, cyber-bullying within the workplace is more sparsely covered. Eleanor Dallaway talks to the managing director of CQR Consulting, David Simpson, to get to the heart of the problem
The changing nature of the information security career
It is often the case that the job we currently do has evolved from something that would be unrecognisable just 10 years before. John Colley, managing director EMEA for (ISC)², examines the progression of infosec careers over the past few decades, and makes some predictions about how the profession will evolve going forward
Free anti-virus software dominates market
With more than one hundred million users, it’s fair to say that Avast!’s ‘free anti-virus’ model is working nicely. It’s the paid for anti-virus model, adopted by the likes of Symantec and Kaspersky, that is struggling to keep its head above water, argues Vincent Steckler, the Avast! CEO…
Searching for Security
With more than 30 000 web pages being compromised every day, search engine results could increasingly lead to malware infection. Kari Larsen asks what the search engines are doing to mitigate security threats, and how users can protect themselves
Espionage in sport
Where there’s money, there’s cybercrime, and sport is no exception. Stephen Pritchard examines the pitfalls and vulnerabilities that the sporting industry faces in securing its vital information
Music File-Sharing Enters a New Decade
The recording industry continues to lose billions of dollars each year, along with tens of thousands of jobs, all thanks to illegally downloaded files. Lauren Moraski examines what is being done to combat the drain on this sector
The charmed life of cybercrime
Crimes, scams, and various forms of nonsense are hardly inventions of the digital age. In fact, they are likely as old as human civilisation. Wendy M. Grossman examines why criminals are finding it easier to engage in cybercrime over more traditional forms of physical theft, and why law enforcement finds it difficult to prosecute the perpetrators