Infosecurity Magazine Features
Leaving a trace
IT forensics is seen by many in the industry as something of a black art. But it's actually a highly professional discipline, with professional software to assist, as Steve Gold discovers
Batten down the hatches
Due to the horrifying quantity of vulnerabilities, and often limited time and budget, application and database security can be quite a headache. Limiting privileges and access, however, is a good place to start, finds Danny Bradbury
Manufacturing IP Securely
Many manufacturers, ignorant to the value of their trade secrets, are leaving their intellectual property wide open to theft. John Sterlicchi reports.
Someone’s got to pay
Consumers are increasingly trading the high street for the home computer, and in both cases getting more than they bargained for. Rob Stringer investigates the fraud and fuzzy legislation of retail security
Give us this day our UTM
As malware becomes more sophisticated, Unified Threat Management systems must also evolve, but without losing touch with a major selling feature: simplicity. Danny Bradbury thinks outside the box
A little less conversation, a little more security please
VoIP is inevitable. Even if your organization has not yet adopted the system, you will be making VoIP calls in one way or another before very long. But should we be concerned? William Knight investigates
Politically speaking
Despite the government’s very public embarrassment over data protection in recent times, information security might still not be very high on their agenda, Wendy Grossman finds…
Saving face in the absence of legislation
Avoiding reputation damage to organisations was viewed as top priority by three quarters of respondents in a global information workforce study, commissioned by ISC2 and conducted by analyst firm Frost & Sullivan. John Colley discussed the findings with Eleanor Dallaway…
Catch me if you can
These days, malware writers are in it for the money. In order to maximise profit, discretion is imperative so stealth technology has been adopted as a rule, rather than an exception. Danny Bradbury looks to the cat and mouse game that researchers and attackers are playing to see who’s coming out on top
Coughs and sneezes spread diseases
Mobile devices can keep business ticking over when human diseases strike, but the devices have viruses of their own, finds William Knight
An injection of new ideas
Securing IT means coping with Donald Rumsfeld’s ‘known unknowns’ – expected attacks whose nature is a surprise. Concepts from medicine, game theory and crowd sourcing may help, finds Danny Bradbury
Watched in the workplace
Employee surveillance is near ubiquitous, but it may be damaging both staff performance and morale, say Adam Joinson and Monica Whitty...
Financial exposure
Wireless networks are an essential cog in large, modern businesses. But if left unsecured, they leave companies vulnerable, especially in a city abundant with close, competing companies, finds Cath Everett
A law without force
After a deluge of data breaches, the UK government is considering ways to provide the public with better shelter, through strengthening data protection law and punishment. Dan Ilett considers the options
Premium pricing
Infosecurity failures can cost millions, but many insurers are reluctant to take the risk, says Danny Bradbury
Putting money where your mouth is
Voice biometrics is coming of age, but are financial services firms sufficiently confident in the technology to implement such systems, asks Steve Gold
Face-off in Oxford
Britain’s oldest university has become a flashpoint for students’ use of social networking and privacy, while companies debate whether to block or encourage Facebook and its rivals. SA Mathieson reports
IT strategy @ UK.gov
The UK government needs to improve its ability to deliver effective IT-based systems at reasonable cost. But the proposed solution could change utterly the relationship between the state and the citizen, reports Ian Grant.
PCI: here to stay
As retailers face the costs and changes involved in complying with the Payment Card Industry Data Security Standard, its worth and necessity are up for debate, with some arguing it gives a raw deal to retailers. Dan Ilett investigates
A fairytale: perfect database security
What do the brothers Grimm and SQL injection attacks have in common? William Knight investigates