Infosecurity Magazine Features

  1. Leaving a trace

    IT forensics is seen by many in the industry as something of a black art. But it's actually a highly professional discipline, with professional software to assist, as Steve Gold discovers

  2. Batten down the hatches

    Due to the horrifying quantity of vulnerabilities, and often limited time and budget, application and database security can be quite a headache. Limiting privileges and access, however, is a good place to start, finds Danny Bradbury

  3. Manufacturing IP Securely

    Many manufacturers, ignorant to the value of their trade secrets, are leaving their intellectual property wide open to theft. John Sterlicchi reports.

  4. Someone’s got to pay

    Consumers are increasingly trading the high street for the home computer, and in both cases getting more than they bargained for. Rob Stringer investigates the fraud and fuzzy legislation of retail security

  5. Give us this day our UTM

    As malware becomes more sophisticated, Unified Threat Management systems must also evolve, but without losing touch with a major selling feature: simplicity. Danny Bradbury thinks outside the box

  6. A little less conversation, a little more security please

    VoIP is inevitable. Even if your organization has not yet adopted the system, you will be making VoIP calls in one way or another before very long. But should we be concerned? William Knight investigates

  7. Politically speaking

    Despite the government’s very public embarrassment over data protection in recent times, information security might still not be very high on their agenda, Wendy Grossman finds…

  8. Saving face in the absence of legislation

    Avoiding reputation damage to organisations was viewed as top priority by three quarters of respondents in a global information workforce study, commissioned by ISC2 and conducted by analyst firm Frost & Sullivan. John Colley discussed the findings with Eleanor Dallaway…

  9. Catch me if you can

    These days, malware writers are in it for the money. In order to maximise profit, discretion is imperative so stealth technology has been adopted as a rule, rather than an exception. Danny Bradbury looks to the cat and mouse game that researchers and attackers are playing to see who’s coming out on top

  10. Coughs and sneezes spread diseases

    Mobile devices can keep business ticking over when human diseases strike, but the devices have viruses of their own, finds William Knight

  11. An injection of new ideas

    Securing IT means coping with Donald Rumsfeld’s ‘known unknowns’ – expected attacks whose nature is a surprise. Concepts from medicine, game theory and crowd sourcing may help, finds Danny Bradbury

  12. Watched in the workplace

    Employee surveillance is near ubiquitous, but it may be damaging both staff performance and morale, say Adam Joinson and Monica Whitty...

  13. Financial exposure

    Wireless networks are an essential cog in large, modern businesses. But if left unsecured, they leave companies vulnerable, especially in a city abundant with close, competing companies, finds Cath Everett

  14. A law without force

    After a deluge of data breaches, the UK government is considering ways to provide the public with better shelter, through strengthening data protection law and punishment. Dan Ilett considers the options

  15. Premium pricing

    Infosecurity failures can cost millions, but many insurers are reluctant to take the risk, says Danny Bradbury

  16. Putting money where your mouth is

    Voice biometrics is coming of age, but are financial services firms sufficiently confident in the technology to implement such systems, asks Steve Gold

  17. Face-off in Oxford

    Britain’s oldest university has become a flashpoint for students’ use of social networking and privacy, while companies debate whether to block or encourage Facebook and its rivals. SA Mathieson reports

  18. IT strategy @ UK.gov

    The UK government needs to improve its ability to deliver effective IT-based systems at reasonable cost. But the proposed solution could change utterly the relationship between the state and the citizen, reports Ian Grant.

  19. PCI: here to stay

    As retailers face the costs and changes involved in complying with the Payment Card Industry Data Security Standard, its worth and necessity are up for debate, with some arguing it gives a raw deal to retailers. Dan Ilett investigates

  20. A fairytale: perfect database security

    What do the brothers Grimm and SQL injection attacks have in common? William Knight investigates

What’s hot on Infosecurity Magazine?