Pub Date : 2011-09-01DOI: 10.1016/S1754-4548(11)70060-2
Eleanor Dallaway (Editor)
We often talk about the importance of education in this industry — we ponder how best to educate our staff, and how to raise awareness about information security. What we dedicate less time to, at least as far as I'm aware, is how to nurture a new generation of information security professionals.
{"title":"Someone Like You","authors":"Eleanor Dallaway (Editor)","doi":"10.1016/S1754-4548(11)70060-2","DOIUrl":"10.1016/S1754-4548(11)70060-2","url":null,"abstract":"<div><p>We often talk about the importance of education in this industry — we ponder how best to educate our staff, and how to raise awareness about information security. What we dedicate less time to, at least as far as I'm aware, is how to nurture a new generation of information security professionals.</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Page 5"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70060-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"100027343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-01DOI: 10.1016/S1754-4548(11)70070-5
Steve Brunswick
{"title":"EU Notification Law Is Not Enough","authors":"Steve Brunswick","doi":"10.1016/S1754-4548(11)70070-5","DOIUrl":"10.1016/S1754-4548(11)70070-5","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Page 44"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70070-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80321231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-01DOI: 10.1016/S1754-4548(11)70064-X
Adrian Davis
Critical infrastructure means many things to many people. Adrian Davis, principal research analyst with the Information Security Forum (ISF), explains why determining which infrastructure elements are critical to a business is the first step in keeping them safe
{"title":"What Is Critical to Your Infrastructure?","authors":"Adrian Davis","doi":"10.1016/S1754-4548(11)70064-X","DOIUrl":"10.1016/S1754-4548(11)70064-X","url":null,"abstract":"<div><p>Critical infrastructure means many things to many people. <strong>Adrian Davis</strong>, principal research analyst with the Information Security Forum (ISF), explains why determining which infrastructure elements are critical to a business is the first step in keeping them safe</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 18-21"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70064-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85351235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-01DOI: 10.1016/S1754-4548(11)70066-3
Fred Donovan
Although the US government is paying more attention than ever to the issue of cybersecurity, the recent battles in Washington over budgets and austerity measures mean that funding could potentially dry up in an instant. Fred Donovan surveys the experts to get their take on where the nation's cybersecurity program is heading
{"title":"Obstacles Facing the US Cybersecurity Initiatve","authors":"Fred Donovan","doi":"10.1016/S1754-4548(11)70066-3","DOIUrl":"10.1016/S1754-4548(11)70066-3","url":null,"abstract":"<div><p>Although the US government is paying more attention than ever to the issue of cybersecurity, the recent battles in Washington over budgets and austerity measures mean that funding could potentially dry up in an instant. <strong>Fred Donovan</strong> surveys the experts to get their take on where the nation's cybersecurity program is heading</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 26-30"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70066-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76731162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Spy Who Hacked Me","authors":"Danny Bradbury","doi":"10.1016/S1754-4548(11)70063-8","DOIUrl":"10.1016/S1754-4548(11)70063-8","url":null,"abstract":"<div><p>James Bond was more of a jock than a nerd, and he probably wouldn't have known how to use a computer, says <strong>Danny Bradbury</strong>. How things have changed…</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 14-17"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70063-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78048900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-01DOI: 10.1016/S1754-4548(11)70067-5
Stephen Pritchard
Despite users being the most integral part of information security, only one to two percent of security budgets are being spent on awareness and education. Stephen Pritchard reports
{"title":"Security Education: A Lesson Learned?","authors":"Stephen Pritchard","doi":"10.1016/S1754-4548(11)70067-5","DOIUrl":"10.1016/S1754-4548(11)70067-5","url":null,"abstract":"<div><p>Despite users being the most integral part of information security, only one to two percent of security budgets are being spent on awareness and education. <strong>Stephen Pritchard</strong> reports</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 31-34"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70067-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"94847294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-01DOI: 10.1016/S1754-4548(11)70069-9
Davey Winder
APTs – and more recently AETs – have divided industry experts in opinion and often been used to scaremonger. Davey Winder reveals the truth behind the APT and AET headlines
{"title":"Persistent and Evasive Attacks Uncovered","authors":"Davey Winder","doi":"10.1016/S1754-4548(11)70069-9","DOIUrl":"10.1016/S1754-4548(11)70069-9","url":null,"abstract":"<div><p><span>APTs – and more recently AETs – have divided industry experts in opinion and often been used to scaremonger. </span><strong>Davey Winder</strong><span> reveals the truth behind the APT and AET headlines</span></p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 40-43"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70069-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80765727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-01DOI: 10.1016/S1754-4548(11)70061-4
Drew Amorosi
The latest APT to come to light is what McAfee has dubbed ‘Shady RAT’. But the folks at Kaspersky have voiced some objections. Drew Amorosi examines the threat…and the controversy
{"title":"You Dirty RAT","authors":"Drew Amorosi","doi":"10.1016/S1754-4548(11)70061-4","DOIUrl":"10.1016/S1754-4548(11)70061-4","url":null,"abstract":"<div><p>The latest APT to come to light is what McAfee has dubbed ‘Shady RAT’. But the folks at Kaspersky have voiced some objections. <strong>Drew Amorosi</strong> examines the threat…and the controversy</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 6-8"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70061-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87192676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}