Infosecurity Magazine Features

  1. Q&A: Ken Pfeil, CISO, Pioneer Investments

    Ken Pfeil of Pioneer Investments sat down with Infosecurity’s Drew Amorosi in Stamford, Connecticut, as the two covered a broad range of topics. Highlights include Windows XP end of life, vulnerability assessment, choosing the right technology, and how to evaluate potential technology vendors.

  2. Comment: Total Internet Failure – When Online Goes Offline

    KPMG’s Stephen Bonner highlights that complacency about the internet’s reliability is no excuse for the lack of a contingency plan

  3. Bridging Information Security’s Enablement Gap

    Information security has emerged from its geeky, niche technical origins to become an integral part of overall organizational strategy. Wendy M. Grossman details how the industry’s professionals continue evolving as business enablers

  4. Comment: New Leadership Amidst Microsoft’s Identity Crisis

    At a crossroads of generational shifts in computing and security threats, Vaultive’s Elad Yoran asks, can Microsoft adapt?

  5. Duck and Cover: Defending Against DDoS Attacks

    Denial-of-service attacks are frequently deployed, yet often organizations fail to prepare themselves against the threat. Ted Kritsonis talks to industry experts about using analytics to prevent and respond to DDoS attacks

  6. Comment: Size Doesn’t Matter in the Battle Against Cybercrime

    Despite having enough resources and dedicated, generous budgets to invest in the latest security solutions, large companies often fail to adequately secure their networks. When it comes to cybersecurity, Fujitsu’s David Robinson argues, large organizations face similar obstacles as their smaller counterparts

  7. Tales of the Cyber Underground: The Blackshades Bust

    In the latest Tales of the Cyber Underground instalment, Tom Brewster looks at the Blackshades bust and considers what it means for the future of cyber policing

    1. Tom Brewster

      Contributing Writer

  8. Security Vendors and Their Technology: Working Better, Together

    Business can be cutthroat, but when a company’s products are enlisted in the war against cyber-threats, it’s a battle that requires allied forces. Drew Amorosi talks to one security professional who underscores why cooperation and integration are increasingly becoming the norm among the security vendor community

  9. Comment: Ethical Compromises in the Name of National Security

    Support for secret systems of indiscriminate surveillance is incompatible with the ethical codes of the information security profession, as Geordie Stewart observes

  10. The Internet of Things: The Good, The Bad, And Everything In Between

    Theoretical physicist Michio Kaku predicts that computers, in the future, “will be everywhere and nowhere”. Join Wendy M. Grossman as she explores this Internet of Things to come

    1. Wendy M. Grossman

      Contributing Writer

  11. Life after Snowden

    What will life on the internet look like, now that the cat is out of the bag? Danny Bradbury reports from the edge of a worrying new frontier

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  12. 2013: The Year Hacktivism Fell?

    At the close of 2012, McAfee claimed attacks by Anonymous would slow in 2013, and it appears the security firm’s prophecy was realized. Tom Brewster looks at the state of hacktivism after a turbulent year, finding it has become something different and possibly far more positive

  13. BYOD: A Victim of its Own Success

    Stephen Pritchard discovers the problems businesses face around BYOD, or bring your own device, are largely problems of success

  14. Preparing for Europe's General Data Protection Regulation

    Will it come, or will it go? Kevin Townsend discusses major roadblocks to the EU’s proposed data protection legislation, and how organizations can prepare

  15. Cloud Security: A Crowded Standards Landscape?

    Lacking a singular gold standard, the cloud security expanse can seem messy at times. But as Davey Winder discovers, it’s actually a form of controlled chaos

  16. The Generation X, Y, Z of Information Security

    Not all millennials approach privacy and security with the same attitudes. As Tom Brewster discovers, regardless of age, a one-sized-fits all approach to information security is not the solution

    1. Tom Brewster

      Contributing Writer

  17. Financial Markets: A Playground for Cybercriminals

    The financial markets are supposed to be transparent, and efficient. But what happens if cybercriminals begin playing with them, and would we even know it was happening? Danny Bradbury investigates

    1. Photo of Danny Bradbury

      Danny Bradbury

      Contributing Writer & North America Webinar Moderator

  18. Secure Giving: Information Security Challenges in the Third Sector

    Charities face all the same information security challenges as the public and private sectors, with a couple of extra to boot. Wendy M. Grossman speaks to third-sector CISOs to find out exactly how they are being targeted by shameless cybercriminals

  19. A CEO’s Guide to Risk Management

    General consensus suggests your organization will be breached, and will be hacked. But what risks are worth taking, and which risks have consequences so catastrophic that they are not? Stephen Pritchard investigates

  20. Tackling the Authentication Problem

    Why does authentication remain such a critical vulnerability for information security when there are so many regulatory initiatives and technical solutions attempting to address the problem? Davey Winder investigates the current state of play in the world of authentication

What’s hot on Infosecurity Magazine?