Features

IT Forensics

Mutually Assured Cyber Destruction Mutually Assured Cyber Destruction

Jarno Limnell says without the unveiling of evidence that’s nearly impossible to collect, nation-states should take a look in the mirror before they blame China as the world’s worst transgressor of cyber-espionage
13 August 2013

Go Ahead, Blame China Go Ahead, Blame China

David Stupples contends China’s state-sponsored actors not only have the means, but also the motive to hack away at any organization’s intellectual property
13 August 2013

Do the Right Thing… For a Price: The Market for Vulnerability Data Do the Right Thing… For a Price: The Market for Vulnerability Data

The market for vulnerability data takes on three shades, depending on motive. As security researchers increasingly attempt to commoditize their findings, Davey Winder seeks to put a value on vulnerability information
31 July 2013

Interview: Microsoft's Scott Charney Interview: Microsoft's Scott Charney

Scott Charney tells Eleanor Dallaway why he is so proud to work for Microsoft, how he went from prosecutor to infosec professional, and why the role of US ‘cyber czar’ was not for him…
16 July 2013

A CEO's Guide to Big Data Security A CEO's Guide to Big Data Security

Feeling a bit lost in the Big Data ocean? The ISF’s Steve Durbin provides a life boat by briefing the Big Chair about its security and risk management implications
04 June 2013

Comment: Beware a Quiet Queen’s Speech Comment: Beware a Quiet Queen’s Speech

Consultant William Wallace finds that what wasn’t said in the recent speech to open the new session of parliament may be as interesting as what was.
28 May 2013

Arab Uprising: Information Security in the Middle East Arab Uprising: Information Security in the Middle East

The Middle East is an emerging market for information security and related awareness. With Israel already at the forefront of the industry, Wendy M. Grossman examines what the rest of the region is doing to catch up
28 May 2013

Comment: Cybersecurity and Reality – What’s in a Word? Comment: Cybersecurity and Reality – What’s in a Word?

What does the word 'cyber' really mean? Gregor Campbell cracks open his dictionary to trace its transformation
21 May 2013

An Inside Look at AT&T’s Operations Center, and its Security Strategy An Inside Look at AT&T’s Operations Center, and its Security Strategy

One of the largest network services providers in the US invited Infosecurity to its Global Network Operations Center in Bedminster, New Jersey, and then explained why it is poised for success within the IT security market.
16 May 2013

The Prognosis for Medical Device Security The Prognosis for Medical Device Security

Medical devices can be hacked – but how much of a danger is it? Danny Bradbury asks the experts
07 May 2013

Showing 31 - 40 of 126 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×