Infosecurity Magazine Features
Battle of the Internet Browsers
Browsers are the hacker’s window into your PC – but how are they compromised, and what are vendors doing to harden them? Danny Bradbury examines the techniques vendors are employing, and looks at why user education is one of the primary solutions for increased security
Preserving Bletchley Park
While information security professionals no doubt appreciate the worthiness and plight of Bletchley Park, the ‘Nation’s best kept secret’ as it is commonly known, is struggling to get the funding it needs to preserve its legacy and its infrastructure. Peter Berlich reports
Spamming the socially active - spam diversifies to Twitter, IM, SMS, etc
Once poison found only in email accounts, spam is now polluting every form of electronic communication from IM to SMS and from blogs to tweets. But how well is it doing outside its natural domain? William Knight takes a look at non-email spam
The User is Not the Enemy: How to Increase Information Security Usability
People have long been accused of being the ‘weakest link’ in information security, but what if lack of usability and security training is actually at the heart of the matter? Wendy M. Grossman investigates
Securing the defence - information security and the defence
Securing communications between military and defence departments and the outside world is a bit of a puzzle as there are no common information security standards or tools. Cath Everett looks at the current situation and at what is being done to address the issue
Securing the 2012 Olympics
Physical and IT security plans are well underway for the London Games in 2012, but could reputational damage be the real risk? Stephen Pritchard talks to David Blunkett to determine what the real cyberrisks are, and how to control them
Complex Information Security Compliance for Multinational
Multinational companies in North America face a raft of red tape in terms of compliance and regulatory issues, as well as the uphill task of dealing with the complexities of international IT systems and resources. Steve Mansfield-Devine asks how companies can stay within the regulatory confines of relevant information security legislation without compromising profitability
The Challenge of Security by Compliance
Information security has become an unavoidable issue for banking and other financial services organizations globally, and recently many of these organizations have turned to compliance, regulations and industry standards to secure their data and information infrastructure. John P. Pironti reports
Cyberterrorism: A look into the future
Cyberterrorism might mean different things to different people, but one thing is certain – it needs to be taken incredibly seriously. What are we dealing with? How can we defend our nation? How will cyberterrorists of the future look to attack? The (ISC)2 US Government Advisory Board Executive Writers Bureau answers these questions
Orwellian state of security - CCTV
Wherever you turn in most UK cities and towns, you will spot CCTV cameras. They are there for our protection and safety – or so their owners claim. Are they really that effective? And is anyone watching the watchers? Kari Larsen investigates
Defending the US with biometrics
Biometric technologies are enabling the DoD to identify and detain suspected enemies and terrorists, improving citizen security both home and away. Dr. Myra Gray, director of the Biometrics Task Force, explains how and why these biometric solutions are being deployed
Securing a Very Mobile Board - Automatic Backup of Laptops
As mobile working proliferates, boardroom staff is hitting the road with their laptops. Largely unconcerned with backing up their all important data, IT managers back in the office need to automate and secure this process. Steve Gold looks at how to secure a very mobile Board
Cloud computing in the spotlight
Cloud computing promises cost savings and productivity benefits, but how secure is the technology? Neil Stinchcombe investigates
License to hack? - Ethical hacking
Ethical hacking seems to be a contradiction in terms, but what better way of making enterprises pay attention to their security flaws, than by acting like criminals? William Knight investigates
Telcos Dialing into Managed Security
Back in the day, telecommunication companies focused purely on voice calls. Then, data services and broadband access became common. The latest generation of services focuses on managed security, says John Sterlicchi – and it could revolutionize the industry
Finding your way: An overview of information security industry qualifications and associations
The proliferation of information security qualifications, standards and membership associations has reached a level whereby a degree of confusion is understandable. Peter Drabwell introduces some of the qualifications and associations out there
Nine Lives - Self-modifying Malware
As the Conficker worm proved when it first appeared in October 2008, there’s more to a piece of malware code than meets the eye, especially when it is self-updating. But can self-updating also mean self-modifying? Steve Gold investigates whether an IT security manager’s nightmare has become a programming reality
Why Physicists Choose Information Security
There appears to be no such thing as a ‘typical’ IT or information security career, and the discipline is accustomed to benefitting from transferable skills that newcomers bring from past experience and careers. Peter Berlich looks at why the information security industry is attracting a high number of qualified individuals from fields like IT, engineering and sciences
The black art of digital forensics
What makes a good digital forensics specialist? Steve Gold looks at some of the latest applications and investigates how the forensic investigator’s role has evolved in order to comply with changing customer priorities
Running an Organization Effectively While Still Maintaining Security
Today’s CISO needs a range of skills in order to market the security effort effectively to the rest of the business. The (ISC)2 US government advisory board executive writers bureau explores some strategies that can help ensure support from the rest of the organization