Infosecurity Magazine Features

Battle of the Internet Browsers
Browsers are the hacker’s window into your PC – but how are they compromised, and what are vendors doing to harden them? Danny Bradbury examines the techniques vendors are employing, and looks at why user education is one of the primary solutions for increased security
Preserving Bletchley Park
While information security professionals no doubt appreciate the worthiness and plight of Bletchley Park, the ‘Nation’s best kept secret’ as it is commonly known, is struggling to get the funding it needs to preserve its legacy and its infrastructure. Peter Berlich reports

Spamming the socially active - spam diversifies to Twitter, IM, SMS, etc
Once poison found only in email accounts, spam is now polluting every form of electronic communication from IM to SMS and from blogs to tweets. But how well is it doing outside its natural domain? William Knight takes a look at non-email spam

The User is Not the Enemy: How to Increase Information Security Usability
People have long been accused of being the ‘weakest link’ in information security, but what if lack of usability and security training is actually at the heart of the matter? Wendy M. Grossman investigates

Securing the defence - information security and the defence
Securing communications between military and defence departments and the outside world is a bit of a puzzle as there are no common information security standards or tools. Cath Everett looks at the current situation and at what is being done to address the issue

Securing the 2012 Olympics
Physical and IT security plans are well underway for the London Games in 2012, but could reputational damage be the real risk? Stephen Pritchard talks to David Blunkett to determine what the real cyberrisks are, and how to control them

Complex Information Security Compliance for Multinational
Multinational companies in North America face a raft of red tape in terms of compliance and regulatory issues, as well as the uphill task of dealing with the complexities of international IT systems and resources. Steve Mansfield-Devine asks how companies can stay within the regulatory confines of relevant information security legislation without compromising profitability

The Challenge of Security by Compliance
Information security has become an unavoidable issue for banking and other financial services organizations globally, and recently many of these organizations have turned to compliance, regulations and industry standards to secure their data and information infrastructure. John P. Pironti reports

Cyberterrorism: A look into the future
Cyberterrorism might mean different things to different people, but one thing is certain – it needs to be taken incredibly seriously. What are we dealing with? How can we defend our nation? How will cyberterrorists of the future look to attack? The (ISC)2 US Government Advisory Board Executive Writers Bureau answers these questions

Orwellian state of security - CCTV
Wherever you turn in most UK cities and towns, you will spot CCTV cameras. They are there for our protection and safety – or so their owners claim. Are they really that effective? And is anyone watching the watchers? Kari Larsen investigates

Defending the US with biometrics
Biometric technologies are enabling the DoD to identify and detain suspected enemies and terrorists, improving citizen security both home and away. Dr. Myra Gray, director of the Biometrics Task Force, explains how and why these biometric solutions are being deployed

Securing a Very Mobile Board - Automatic Backup of Laptops
As mobile working proliferates, boardroom staff is hitting the road with their laptops. Largely unconcerned with backing up their all important data, IT managers back in the office need to automate and secure this process. Steve Gold looks at how to secure a very mobile Board

Cloud computing in the spotlight
Cloud computing promises cost savings and productivity benefits, but how secure is the technology? Neil Stinchcombe investigates

License to hack? - Ethical hacking
Ethical hacking seems to be a contradiction in terms, but what better way of making enterprises pay attention to their security flaws, than by acting like criminals? William Knight investigates

Telcos Dialing into Managed Security
Back in the day, telecommunication companies focused purely on voice calls. Then, data services and broadband access became common. The latest generation of services focuses on managed security, says John Sterlicchi – and it could revolutionize the industry

Finding your way: An overview of information security industry qualifications and associations
The proliferation of information security qualifications, standards and membership associations has reached a level whereby a degree of confusion is understandable. Peter Drabwell introduces some of the qualifications and associations out there

Nine Lives - Self-modifying Malware
As the Conficker worm proved when it first appeared in October 2008, there’s more to a piece of malware code than meets the eye, especially when it is self-updating. But can self-updating also mean self-modifying? Steve Gold investigates whether an IT security manager’s nightmare has become a programming reality

Why Physicists Choose Information Security
There appears to be no such thing as a ‘typical’ IT or information security career, and the discipline is accustomed to benefitting from transferable skills that newcomers bring from past experience and careers. Peter Berlich looks at why the information security industry is attracting a high number of qualified individuals from fields like IT, engineering and sciences

The black art of digital forensics
What makes a good digital forensics specialist? Steve Gold looks at some of the latest applications and investigates how the forensic investigator’s role has evolved in order to comply with changing customer priorities

Running an Organization Effectively While Still Maintaining Security
Today’s CISO needs a range of skills in order to market the security effort effectively to the rest of the business. The (ISC)2 US government advisory board executive writers bureau explores some strategies that can help ensure support from the rest of the organization



