Features

Compliance and Policy

Review: The CISSP Companion You Can’t Do Without Review: The CISSP Companion You Can’t Do Without

Shan Lee finds there is much to learn from Javvad Malik’s humor in his new e-book "The CISSP Companion Handbook"
24 July 2014

Navigating the Regulatory Waters of Information Security Navigating the Regulatory Waters of Information Security

Steve Durbin of the ISF looks back at how the regulatory framework has evolved, discussing privacy, EU and US data and security directives. Durbin provides insight and guidance into how the modern CISO can build a platform that makes implementing mandated regulatory changes easier, resulting in compliance programs that manage the business safely and soundly, well before a regulator needs to intervene
22 July 2014

Q&A: Ken Pfeil, CISO, Pioneer Investments Q&A: Ken Pfeil, CISO, Pioneer Investments

Ken Pfeil of Pioneer Investments sat down with Infosecurity’s Drew Amorosi in Stamford, Connecticut, as the two covered a broad range of topics. Highlights include Windows XP end of life, vulnerability assessment, choosing the right technology, and how to evaluate potential technology vendors.
18 July 2014

Security Vendors and Their Technology: Working Better, Together Security Vendors and Their Technology: Working Better, Together

Business can be cutthroat, but when a company’s products are enlisted in the war against cyber-threats, it’s a battle that requires allied forces. Drew Amorosi talks to one security professional who underscores why cooperation and integration are increasingly becoming the norm among the security vendor community
01 July 2014

Comment: Ethical Compromises in the Name of National Security Comment: Ethical Compromises in the Name of National Security

Support for secret systems of indiscriminate surveillance is incompatible with the ethical codes of the information security profession, as Geordie Stewart observes
26 June 2014

Comment: Bank Heists Haven’t Disappeared, They’ve Evolved Comment: Bank Heists Haven’t Disappeared, They’ve Evolved

Evidence suggests bank robberies are in decline, but Auriga’s Darren Hodder suggests the thieves may simply have hung up their balaclavas in favor of the mouse
12 June 2014

Life after Snowden Life after Snowden

What will life on the internet look like, now that the cat is out of the bag? Danny Bradbury reports from the edge of a worrying new frontier
10 June 2014

Members' Content

The Perfect Target The Perfect Target

As the extraordinary Target breach narrative continues to unravel, Drew Amorosi investigates exactly who and what is to blame
03 June 2014

Reassessing the Value of PCI in the Target Breach Aftermath Reassessing the Value of PCI in the Target Breach Aftermath

Tim Lansdale is the head of payment security at WorldPay. In the aftermath of the Target data breach, Eleanor Dallaway met him over a coffee to talk about the value of PCI and the online payment threat landscape
21 May 2014

Interview: Rik Ferguson Interview: Rik Ferguson

At this winter's RSA Conference in San Francisco, Eleanor Dallaway interviewed an information security researcher, a rock star, a father of three, a graduate of French, and a man whose lifetime ambition is to sell pottery in the Dordogne. Of course, these all describe one person. Infosecurity presents Rik Ferguson…
14 May 2014

Showing 1 - 10 of 361 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×