As technology and online behaviors change, so too do methods to compromise a person's — or organization's — most vital assets: their financial details. Ted Kritsonis examines how cyber thieves are adapting, and what the banks are doing to stop them
As technology and online behaviors change, so too do methods to compromise a person's — or organization's — most vital assets: their financial details. Ted Kritsonis examines how cyber thieves are adapting, and what the banks are doing to stop them
How far ahead of the curve – or behind it – are vendors when it comes to identifying security trends? Danny Bradbury finds out that the curve may not matter at all
Data loss prevention: the term that fills marketing managers with joy, and infosec managers with dread. Preventing a data leak may be the top priority for the IT security team, but is DLP technology mature, and cost effective enough, to be the answer? Stephen Pritchard reports
Once upon a time, anti-virus technology was a well-coveted standalone product. These days, it is often considered a commodity that can be adequately built into a UTM offering. Cath Everett investigates whether or not a market for standalone anti-virus technology still exists
My last editorial was all about change. I wrote that uncertainty was the biggest certainty we have in this industry, and to (bizarrely) quote myself, “Change will happen, and it will do so because whatever preceded ‘it’ was imperfect”. In the two months since the May/June issue was published, Infosecurity magazine has been through some exciting changes of its own.
At long last, a cybersecurity career field has emerged. The (ISC)2 US Government Advisory Board Executive Writers Bureau examines where employment opportunities lie and how much you can expect to be paid in this very important sector
An awful lot of lip service has been paid to smartphone security. Whereas most industry experts agree that, to date at least, smartphone security threats are mainly hype, that doesn't mean this won't change. Davey Winder investigates…
Using biometric data for identity access and management can be a controversial move. Esther Shein examines the drawbacks, and looks at where and how biometrics are currently being used
Vendors, analysts, and commentators alike have long predicted a surge in malware affecting Apple's products. Yet, until recently, these prognostications have failed to materialize. Drew Amorosi examines recent malware threats to Apple's OS X operating system to find out if this is an anomaly, or a sign of things to come