Infosecurity Magazine Features

  1. Through Hell and high water

    Responsive business thrives on continuity. William Knight finds that the trick to uninterrupted business is testing continuity processes before disaster strikes

  2. Education, education, education

    Technology can only go so far. And then there’s people. Cath Everett explains why the importance of educating staff is greater than ever before

  3. Manufacturing IP Securely

    Many manufacturers, ignorant to the value of their trade secrets, are leaving their intellectual property wide open to theft. John Sterlicchi reports.

  4. Give us this day our UTM

    As malware becomes more sophisticated, Unified Threat Management systems must also evolve, but without losing touch with a major selling feature: simplicity. Danny Bradbury thinks outside the box

  5. Someone’s got to pay

    Consumers are increasingly trading the high street for the home computer, and in both cases getting more than they bargained for. Rob Stringer investigates the fraud and fuzzy legislation of retail security

  6. A little less conversation, a little more security please

    VoIP is inevitable. Even if your organization has not yet adopted the system, you will be making VoIP calls in one way or another before very long. But should we be concerned? William Knight investigates

  7. Catch me if you can

    These days, malware writers are in it for the money. In order to maximise profit, discretion is imperative so stealth technology has been adopted as a rule, rather than an exception. Danny Bradbury looks to the cat and mouse game that researchers and attackers are playing to see who’s coming out on top

  8. Saving face in the absence of legislation

    Avoiding reputation damage to organisations was viewed as top priority by three quarters of respondents in a global information workforce study, commissioned by ISC2 and conducted by analyst firm Frost & Sullivan. John Colley discussed the findings with Eleanor Dallaway…

  9. Politically speaking

    Despite the government’s very public embarrassment over data protection in recent times, information security might still not be very high on their agenda, Wendy Grossman finds…

  10. Coughs and sneezes spread diseases

    Mobile devices can keep business ticking over when human diseases strike, but the devices have viruses of their own, finds William Knight

  11. Watched in the workplace

    Employee surveillance is near ubiquitous, but it may be damaging both staff performance and morale, say Adam Joinson and Monica Whitty...

  12. An injection of new ideas

    Securing IT means coping with Donald Rumsfeld’s ‘known unknowns’ – expected attacks whose nature is a surprise. Concepts from medicine, game theory and crowd sourcing may help, finds Danny Bradbury

  13. Putting money where your mouth is

    Voice biometrics is coming of age, but are financial services firms sufficiently confident in the technology to implement such systems, asks Steve Gold

  14. Premium pricing

    Infosecurity failures can cost millions, but many insurers are reluctant to take the risk, says Danny Bradbury

  15. A law without force

    After a deluge of data breaches, the UK government is considering ways to provide the public with better shelter, through strengthening data protection law and punishment. Dan Ilett considers the options

  16. Financial exposure

    Wireless networks are an essential cog in large, modern businesses. But if left unsecured, they leave companies vulnerable, especially in a city abundant with close, competing companies, finds Cath Everett

  17. Face-off in Oxford

    Britain’s oldest university has become a flashpoint for students’ use of social networking and privacy, while companies debate whether to block or encourage Facebook and its rivals. SA Mathieson reports

  18. PCI: here to stay

    As retailers face the costs and changes involved in complying with the Payment Card Industry Data Security Standard, its worth and necessity are up for debate, with some arguing it gives a raw deal to retailers. Dan Ilett investigates

  19. IT strategy @ UK.gov

    The UK government needs to improve its ability to deliver effective IT-based systems at reasonable cost. But the proposed solution could change utterly the relationship between the state and the citizen, reports Ian Grant.

  20. A fairytale: perfect database security

    What do the brothers Grimm and SQL injection attacks have in common? William Knight investigates

What’s Hot on Infosecurity Magazine?