Infosecurity Magazine Features

  1. Virtualization: virtually a commodity

    Virtualization is a welcome medicine for many of IT's irritating symptoms. But is there a risk that basic information security hygiene will suffer as a result? William Knight investigates

  2. Information security goes green

    Green IT has gone mainstream. The last year has seen corporations such as Citigroup establishing their environmental credentials by opening green data centres. But how do the separate disciplines of green IT and information security come together? Robin Arnfield reports

  3. Outsourcing information security could be a risky business

    Over the past two decades, outsourcing and offshoring have become central to the business strategy of many organizations. The ongoing race to cut costs has resulted in mass migrations of whole industry sectors from low-cost regions to lower- cost ones, benefitting one and often distressing another - and the information security industry is no exception. Krag Brotby reports.

  4. ID cards - protecting or endangering our privacy and security?

    With the national ID card being rolled out to the first British workers this year, Wendy Grossman looks at the privacy and security concerns behind the initiative, and finds that an unexpected trade-off is being made

  5. Information security and the stock market

    The financial system is considered part of the critical national infrastructure as far as the USA is concerned. Danny Bradbury asks what steps are being taken to protect the stock market, and the companies that use it?

  6. Information security and the recession

    As the recession continues to chew into budgets, and cyber criminals see increased opportunity for looting, CIOs must ensure that information security defences remain strong and affordable, even if this means a little bargaining. Stephen Pritchard looks at how organisations can negotiate the rough seas ahead.

  7. Educating children on data protection

    The use of biometrics and CCTV in school classrooms - installed to protect pupils - may just as easily put them at risk of other dangers. What, then, can be done to prepare our children for the big wide world of data protection? Rob Stringer reports…

  8. US standards drive Canadian information security

    An absence of legislation and the presence of the laissez-faire attitude has resulted in Canada being rather lax when it comes to information security compliance. Robin Arnfield looks at how US standards are driving the Canadian information security marketplace

  9. Information security in the re-inventing Silicon Valley

    Silicon Valley, home to some of the world’s most talented information security professionals, and housing many of the information security market’s biggest players, is a hub of innovation. But the Valley hasn’t always been famed for its offerings in IT technology, and with bio-tech sweeping the Valley as the next big thing, it may soon re-invent itself once more. Eleanor Dallaway visited the Bay Area to talk to the people that are witnessing this evolution first-hand…

  10. Up, up and away

    Satisfying the regulatory frameworks associated with public sector defense projects is just one hurdle that the aerospace sector must overcome. Danny Bradbury looks at the sector’s challenges and finds that a single, cohesive security structure could be the answer

  11. Too Many Cooks

    Cyberthreats are increasingly a national security issue, and evidence suggests that the US is not adequately prepared for attacks across the network. Obama’s promise to appoint a Federal CTO is promising, but what else needs to be done to ensure that cyber-enemies are kept at bay? Danny Bradbury reports

  12. Look After Your SCADA Heart

    Critical national infrastructures such as the National Grid, water and other utility networks have SCADA technology at their heart, but how are these systems protected against hacker, malware and terrorist attacks? Steve Gold spoke to the major players in this important, but little-understood, side of the security industry

  13. The evolution of anti-virus

    Sometimes considered more an irritant than prophylactic, has the traditional anti-virus file checker been assigned to the recycle bin of computer history? William Knight scratches beneath the surface to ask where all that anti-virus scanning technology will end up

  14. Keeping sensitive information secure when staff is leaving

    Career loyalty is an endangered creature. Unlike our predecessors, today’s workforce is unlikely to stay committed to a job for five years, let alone their entire lives. But with such a fluid stream of employees keeping human resources busy, and countless eyes being cast over company data, Rob Stringer investigates how sensitive information can stay faithful to its organisation, even if its staff don’t...

  15. What level of authentication is needed?

    Usability and context are often more important than the absolute effectiveness of authentication. It's why the simple password refuses to die, reports William Knight.

  16. Biometrics reach maturity

    In both the identity management and security arenas, the use of biometric technology is increasing apace. Sebastian Fox looks at how the business application of biometric technology is shaping the reality of our everyday lives more than ever before...

  17. Complying to a false sense of security

    Simply ticking the boxes to comply with legislation can give companies a false sense of security, finds Wendy M. Grossman

  18. Biometrics - more than meets the eye

    Biometrics is poised to enter the mainstream security market, but how - and when - will it happen? Steve Gold speaks to the movers and shakers in this emerging security marketplace and elicits some interesting predictions

  19. Education, education, education

    Technology can only go so far. And then there’s people. Cath Everett explains why the importance of educating staff is greater than ever before

  20. Through Hell and high water

    Responsive business thrives on continuity. William Knight finds that the trick to uninterrupted business is testing continuity processes before disaster strikes

What’s hot on Infosecurity Magazine?