Features

IT Forensics

Comment: Cybersecurity and Reality – What’s in a Word? Comment: Cybersecurity and Reality – What’s in a Word?

What does the word 'cyber' really mean? Gregor Campbell cracks open his dictionary to trace its transformation
21 May 2013

An Inside Look at AT&T’s Operations Center, and its Security Strategy An Inside Look at AT&T’s Operations Center, and its Security Strategy

One of the largest network services providers in the US invited Infosecurity to its Global Network Operations Center in Bedminster, New Jersey, and then explained why it is poised for success within the IT security market.
16 May 2013

The Prognosis for Medical Device Security The Prognosis for Medical Device Security

Medical devices can be hacked – but how much of a danger is it? Danny Bradbury asks the experts
07 May 2013

Comment: Exposing the Myths of Access Rights Management Comment: Exposing the Myths of Access Rights Management

Managing access rights is time-consuming and often considered a mundane task. Nevertheless, making sure only the right people can access company data is a business-critical function. Christian Zander of protected-networks.com addresses a number of ‘myths’ he has encountered when discussing this issue with senior IT management across Europe.
02 May 2013

Interview: Dorothy Denning Interview: Dorothy Denning

In her heart a true academic, Drew Amorosi tracks down Dorothy Denning – renowned information security researcher and trainer of today’s cyber warriors
30 April 2013

An Argument in Favor of Licensing Information Security Professionals

Allan Boardman says it’s time to license information security professionals and join the ranks of other esteemed professions
25 April 2013

An Argument Against the Licensing of Information Security Professionals

A licensing scheme for information security professionals would create more issues than it solves, according to Hord Tipton
25 April 2013

Interview: HD Moore, Chief Security Officer at Rapid7, Chief Architect And Creator of Metasploit Interview: HD Moore, Chief Security Officer at Rapid7, Chief Architect And Creator of Metasploit

HD Moore talks to Infosecurity Magazine about today’s IT security landscape and how his hobby, penetration testing solution Metasploit, attracted the attention of vulnerability management and penetration testing solutions provider Rapid7.
22 April 2013

Interview: Larry Ponemon Interview: Larry Ponemon

Dr. Larry Ponemon is the chairman and founder of the Ponemon Institute, and one of the nicest people you may ever meet. Here’s what happened when Eleanor Dallaway met the King of Privacy himself…
22 April 2013

In Cyberspace, No One Can Hear You Scream In Cyberspace, No One Can Hear You Scream

Royal Holloway’s Geraint Price and Keith Martin call for innovative approaches to securing cyberspace that go beyond the current practitioners’ toolkit
19 April 2013

Showing 31 - 40 of 119 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×