Infosecurity Magazine Features

Outsourcing: When to DIY and When to Call a Consultancy

Outsourcing: When to DIY and When to Call a Consultancy

To outsource or not to outsource: that is the question that has been facing CISOs the world over since the dawn of time, and the question that Phil Muncaster puts to information security experts

Playing for Keeps: How Cyber-Criminals are Following the Money to Video Games

Playing for Keeps: How Cyber-Criminals are Following the Money to Video Games

The global video game market just topped $100bn in value, and cyber-criminals want a piece of it. Danny Bradbury finds out how they operate

Cyber-Warfare: Who’s Afraid of the Big Red Button?

Cyber-Warfare: Who’s Afraid of the Big Red Button?

If current online skirmishes can’t be branded ‘war’, how soon before a major global conflict unfolds, asks Tom Brewster.

A Troubled Marriage: Can Security and Privacy Happily Co-Exist in the Enterprise?

A Troubled Marriage: Can Security and Privacy Happily Co-Exist in the Enterprise?

Wendy M. Grossman examines why security and privacy find it so hard to live together in the corporate world

The Merchant of Malware

The Merchant of Malware

The Obama Administration recently released some details on its decision-making process for publicly disclosing zero-day vulnerabilities. Drew Amorosi reports.

Sizing Up the Tools of the Trade

Sizing Up the Tools of the Trade

The (ISC)² US Government Advisory Board Executive Writers Bureau (EWB) looks to help CISOs and their counterparts identify cost-effective approaches amidst the soaring price of cybersecurity tools.

Navigating the Potential Windows XP Apocalypse

Navigating the Potential Windows XP Apocalypse

To upgrade, or not to upgrade? It’s a question that each organization must grapple with. Yet, not all environments lend themselves to a move away from Windows XP. Wendy M. Grossman surveys the peril.

Cybercrime and Punishment

Cybercrime and Punishment

We all know the fight against cybercrime is an uphill battle, as Kevin Townsend explains. In the end, he finds, the solution may be a change in both legal and social policies.

A Tale of Heartbleed

A Tale of Heartbleed

What some call the worst bug in history is only a few months old. Danny Bradbury asks: Do you really think Heartbleed is over?

Beware of the Software Pirates

Beware of the Software Pirates

Legendary pirates of the seas were rather good at clandestine attacks.

The tip of the iceberg? Why massive Russian cyber attack should be a wake-up call

The tip of the iceberg? Why massive Russian cyber attack should be a wake-up call

Infosecurity speaks to a range of industry experts about the 1.2bn password breach and the implications for website security.

Tales of the Cyber Underground: Inside the Underground Ransomware Market

Tales of the Cyber Underground: Inside the Underground Ransomware Market

With the volume of ransomware decreasing according to recent data, the quality appears to be increasing in tandem. Tom Brewster charts the evolution in the latest Tales of the Cyber Underground installment