Infosecurity Magazine Features

The tip of the iceberg? Why massive Russian cyber attack should be a wake-up call

The tip of the iceberg? Why massive Russian cyber attack should be a wake-up call

Infosecurity speaks to a range of industry experts about the 1.2bn password breach and the implications for website security.

Tales of the Cyber Underground: Inside the Underground Ransomware Market

Tales of the Cyber Underground: Inside the Underground Ransomware Market

With the volume of ransomware decreasing according to recent data, the quality appears to be increasing in tandem. Tom Brewster charts the evolution in the latest Tales of the Cyber Underground installment

Navigating the Regulatory Waters of Information Security

Navigating the Regulatory Waters of Information Security

Steve Durbin of the ISF looks back at how the regulatory framework has evolved, discussing privacy, EU and US data and security directives. Durbin provides insight and guidance into how the modern CISO can build a platform that makes implementing mandated regulatory changes easier, resulting in compliance programs that manage the business safely and soundly, well before a regulator needs to intervene

Q&A: Ken Pfeil, CISO, Pioneer Investments

Q&A: Ken Pfeil, CISO, Pioneer Investments

Ken Pfeil of Pioneer Investments sat down with Infosecurity’s Drew Amorosi in Stamford, Connecticut, as the two covered a broad range of topics. Highlights include Windows XP end of life, vulnerability assessment, choosing the right technology, and how to evaluate potential technology vendors.

Comment: Total Internet Failure – When Online Goes Offline

Comment: Total Internet Failure – When Online Goes Offline

KPMG’s Stephen Bonner highlights that complacency about the internet’s reliability is no excuse for the lack of a contingency plan

Bridging Information Security’s Enablement Gap

Bridging Information Security’s Enablement Gap

Information security has emerged from its geeky, niche technical origins to become an integral part of overall organizational strategy. Wendy M. Grossman details how the industry’s professionals continue evolving as business enablers

Comment: New Leadership Amidst Microsoft’s Identity Crisis

Comment: New Leadership Amidst Microsoft’s Identity Crisis

At a crossroads of generational shifts in computing and security threats, Vaultive’s Elad Yoran asks, can Microsoft adapt?

Duck and Cover: Defending Against DDoS Attacks

Duck and Cover: Defending Against DDoS Attacks

Denial-of-service attacks are frequently deployed, yet often organizations fail to prepare themselves against the threat. Ted Kritsonis talks to industry experts about using analytics to prevent and respond to DDoS attacks

Comment: Size Doesn’t Matter in the Battle Against Cybercrime

Comment: Size Doesn’t Matter in the Battle Against Cybercrime

Despite having enough resources and dedicated, generous budgets to invest in the latest security solutions, large companies often fail to adequately secure their networks. When it comes to cybersecurity, Fujitsu’s David Robinson argues, large organizations face similar obstacles as their smaller counterparts

Tales of the Cyber Underground: The Blackshades Bust

Tales of the Cyber Underground: The Blackshades Bust

In the latest Tales of the Cyber Underground instalment, Tom Brewster looks at the Blackshades bust and considers what it means for the future of cyber policing

Security Vendors and Their Technology: Working Better, Together

Security Vendors and Their Technology: Working Better, Together

Business can be cutthroat, but when a company’s products are enlisted in the war against cyber-threats, it’s a battle that requires allied forces. Drew Amorosi talks to one security professional who underscores why cooperation and integration are increasingly becoming the norm among the security vendor community

Comment: Ethical Compromises in the Name of National Security

Comment: Ethical Compromises in the Name of National Security

Support for secret systems of indiscriminate surveillance is incompatible with the ethical codes of the information security profession, as Geordie Stewart observes