Infosecurity Magazine Features

  1. Battle of the Internet Browsers

    Browsers are the hacker’s window into your PC – but how are they compromised, and what are vendors doing to harden them? Danny Bradbury examines the techniques vendors are employing, and looks at why user education is one of the primary solutions for increased security

  2. Preserving Bletchley Park

    While information security professionals no doubt appreciate the worthiness and plight of Bletchley Park, the ‘Nation’s best kept secret’ as it is commonly known, is struggling to get the funding it needs to preserve its legacy and its infrastructure. Peter Berlich reports

  3. Spamming the socially active - spam diversifies to Twitter, IM, SMS, etc

    Once poison found only in email accounts, spam is now polluting every form of electronic communication from IM to SMS and from blogs to tweets. But how well is it doing outside its natural domain? William Knight takes a look at non-email spam

  4. The User is Not the Enemy: How to Increase Information Security Usability

    People have long been accused of being the ‘weakest link’ in information security, but what if lack of usability and security training is actually at the heart of the matter? Wendy M. Grossman investigates

  5. Securing the defence - information security and the defence

    Securing communications between military and defence departments and the outside world is a bit of a puzzle as there are no common information security standards or tools. Cath Everett looks at the current situation and at what is being done to address the issue

  6. Securing the 2012 Olympics

    Physical and IT security plans are well underway for the London Games in 2012, but could reputational damage be the real risk? Stephen Pritchard talks to David Blunkett to determine what the real cyberrisks are, and how to control them

  7. Complex Information Security Compliance for Multinational

    Multinational companies in North America face a raft of red tape in terms of compliance and regulatory issues, as well as the uphill task of dealing with the complexities of international IT systems and resources. Steve Mansfield-Devine asks how companies can stay within the regulatory confines of relevant information security legislation without compromising profitability

  8. The Challenge of Security by Compliance

    Information security has become an unavoidable issue for banking and other financial services organizations globally, and recently many of these organizations have turned to compliance, regulations and industry standards to secure their data and information infrastructure. John P. Pironti reports

  9. Cyberterrorism: A look into the future

    Cyberterrorism might mean different things to different people, but one thing is certain – it needs to be taken incredibly seriously. What are we dealing with? How can we defend our nation? How will cyberterrorists of the future look to attack? The (ISC)2 US Government Advisory Board Executive Writers Bureau answers these questions

  10. Orwellian state of security - CCTV

    Wherever you turn in most UK cities and towns, you will spot CCTV cameras. They are there for our protection and safety – or so their owners claim. Are they really that effective? And is anyone watching the watchers? Kari Larsen investigates

  11. Defending the US with biometrics

    Biometric technologies are enabling the DoD to identify and detain suspected enemies and terrorists, improving citizen security both home and away. Dr. Myra Gray, director of the Biometrics Task Force, explains how and why these biometric solutions are being deployed

  12. Securing a Very Mobile Board - Automatic Backup of Laptops

    As mobile working proliferates, boardroom staff is hitting the road with their laptops. Largely unconcerned with backing up their all important data, IT managers back in the office need to automate and secure this process. Steve Gold looks at how to secure a very mobile Board

  13. Cloud computing in the spotlight

    Cloud computing promises cost savings and productivity benefits, but how secure is the technology? Neil Stinchcombe investigates

  14. License to hack? - Ethical hacking

    Ethical hacking seems to be a contradiction in terms, but what better way of making enterprises pay attention to their security flaws, than by acting like criminals? William Knight investigates

  15. Telcos Dialing into Managed Security

    Back in the day, telecommunication companies focused purely on voice calls. Then, data services and broadband access became common. The latest generation of services focuses on managed security, says John Sterlicchi – and it could revolutionize the industry

  16. Finding your way: An overview of information security industry qualifications and associations

    The proliferation of information security qualifications, standards and membership associations has reached a level whereby a degree of confusion is understandable. Peter Drabwell introduces some of the qualifications and associations out there

  17. Nine Lives - Self-modifying Malware

    As the Conficker worm proved when it first appeared in October 2008, there’s more to a piece of malware code than meets the eye, especially when it is self-updating. But can self-updating also mean self-modifying? Steve Gold investigates whether an IT security manager’s nightmare has become a programming reality

  18. Why Physicists Choose Information Security

    There appears to be no such thing as a ‘typical’ IT or information security career, and the discipline is accustomed to benefitting from transferable skills that newcomers bring from past experience and careers. Peter Berlich looks at why the information security industry is attracting a high number of qualified individuals from fields like IT, engineering and sciences

  19. The black art of digital forensics

    What makes a good digital forensics specialist? Steve Gold looks at some of the latest applications and investigates how the forensic investigator’s role has evolved in order to comply with changing customer priorities

  20. Running an Organization Effectively While Still Maintaining Security

    Today’s CISO needs a range of skills in order to market the security effort effectively to the rest of the business. The (ISC)2 US government advisory board executive writers bureau explores some strategies that can help ensure support from the rest of the organization

What’s hot on Infosecurity Magazine?