Infosecurity Magazine Features
Navigating the Potential Windows XP Apocalypse
To upgrade, or not to upgrade? It’s a question that each organization must grapple with. Yet, not all environments lend themselves to a move away from Windows XP. Wendy M. Grossman surveys the peril.
A Tale of Heartbleed
What some call the worst bug in history is only a few months old. Danny Bradbury asks: Do you really think Heartbleed is over?
Beware of the Software Pirates
Legendary pirates of the seas were rather good at clandestine attacks.
The tip of the iceberg? Why massive Russian cyber attack should be a wake-up call
Infosecurity speaks to a range of industry experts about the 1.2bn password breach and the implications for website security.
Tales of the Cyber Underground: Inside the Underground Ransomware Market
With the volume of ransomware decreasing according to recent data, the quality appears to be increasing in tandem. Tom Brewster charts the evolution in the latest Tales of the Cyber Underground installment
Navigating the Regulatory Waters of Information Security
Steve Durbin of the ISF looks back at how the regulatory framework has evolved, discussing privacy, EU and US data and security directives. Durbin provides insight and guidance into how the modern CISO can build a platform that makes implementing mandated regulatory changes easier, resulting in compliance programs that manage the business safely and soundly, well before a regulator needs to intervene
Q&A: Ken Pfeil, CISO, Pioneer Investments
Ken Pfeil of Pioneer Investments sat down with Infosecurity’s Drew Amorosi in Stamford, Connecticut, as the two covered a broad range of topics. Highlights include Windows XP end of life, vulnerability assessment, choosing the right technology, and how to evaluate potential technology vendors.
Comment: Total Internet Failure – When Online Goes Offline
KPMG’s Stephen Bonner highlights that complacency about the internet’s reliability is no excuse for the lack of a contingency plan
Bridging Information Security’s Enablement Gap
Information security has emerged from its geeky, niche technical origins to become an integral part of overall organizational strategy. Wendy M. Grossman details how the industry’s professionals continue evolving as business enablers
Comment: New Leadership Amidst Microsoft’s Identity Crisis
At a crossroads of generational shifts in computing and security threats, Vaultive’s Elad Yoran asks, can Microsoft adapt?
Duck and Cover: Defending Against DDoS Attacks
Denial-of-service attacks are frequently deployed, yet often organizations fail to prepare themselves against the threat. Ted Kritsonis talks to industry experts about using analytics to prevent and respond to DDoS attacks