Pub Date : 2011-05-01DOI: 10.1016/S1754-4548(11)70032-8
Drew Amorosi
Infosecurity's Drew Amorosi examines three data breach incidents from the past few months that, by their nature, keep security vendors in business, regulators busy, and CISOs up at night. Find out why industry observers think this rash of massive breaches could lead to a ‘PCI for consumer privacy’
{"title":"Data Breach Spring","authors":"Drew Amorosi","doi":"10.1016/S1754-4548(11)70032-8","DOIUrl":"10.1016/S1754-4548(11)70032-8","url":null,"abstract":"<div><p><em>Infosecurity</em>'s Drew Amorosi examines three data breach incidents from the past few months that, by their nature, keep security vendors in business, regulators busy, and CISOs up at night. Find out why industry observers think this rash of massive breaches could lead to a ‘PCI for consumer privacy’</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 3","pages":"Pages 6-9"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70032-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82672135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-01DOI: 10.1016/S1754-4548(11)70041-9
John Colley
{"title":"IEDs Take on a New Meaning","authors":"John Colley","doi":"10.1016/S1754-4548(11)70041-9","DOIUrl":"10.1016/S1754-4548(11)70041-9","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 3","pages":"Page 45"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70041-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88413219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-01DOI: 10.1016/S1754-4548(11)70042-0
Raj Samani
{"title":"Essential Reading, But Direction Needed","authors":"Raj Samani","doi":"10.1016/S1754-4548(11)70042-0","DOIUrl":"10.1016/S1754-4548(11)70042-0","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 3","pages":"Page 46"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70042-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"93347477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-01DOI: 10.1016/S1754-4548(11)70031-6
Eleanor Dallaway (Editor)
For all my sins, I was recently asked by an industry colleague to give a lecture on the past and future of the information security industry to computer science students at the University of Surrey.
最近,一位业内同事邀请我为萨里大学(University of Surrey)计算机科学专业的学生做一场关于信息安全行业的过去和未来的讲座。
{"title":"Talkin' Bout a Revolution","authors":"Eleanor Dallaway (Editor)","doi":"10.1016/S1754-4548(11)70031-6","DOIUrl":"10.1016/S1754-4548(11)70031-6","url":null,"abstract":"<div><p>For all my sins, I was recently asked by an industry colleague to give a lecture on the past and future of the information security industry to computer science students at the University of Surrey.</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 3","pages":"Page 5"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70031-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120392954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-01DOI: 10.1016/S1754-4548(11)70035-3
The (ISC)2 US Government Advisory Board Executive Writers Bureau shares its wisdom and experiences from the perspective of career-IT and IT security professionals by focusing on the keys to a successful career. Read on for advice on how younger professionals can get the best out of this rewarding profession
{"title":"Seven Crucial Infosec Career Steps","authors":"","doi":"10.1016/S1754-4548(11)70035-3","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70035-3","url":null,"abstract":"<div><p>The (ISC)<sup>2</sup> US Government Advisory Board Executive Writers Bureau shares its wisdom and experiences from the perspective of career-IT and IT security professionals by focusing on the keys to a successful career. Read on for advice on how younger professionals can get the best out of this rewarding profession</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 3","pages":"Pages 20-23"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70035-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134840001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-01DOI: 10.1016/S1754-4548(11)70033-X
Drew Amorosi
BT's Bruce Schneier has made a reputation for himself by exploring the unconventional sides of security. Drew Amorosi sat down with this industry luminary to gain a greater understanding of the man and, briefly, dive into the mind and life that is Bruce Schneier…
{"title":"Bruce Schneier","authors":"Drew Amorosi","doi":"10.1016/S1754-4548(11)70033-X","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70033-X","url":null,"abstract":"<div><p>BT's Bruce Schneier has made a reputation for himself by exploring the unconventional sides of security. Drew Amorosi sat down with this industry luminary to gain a greater understanding of the man and, briefly, dive into the mind and life that is Bruce Schneier…</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 3","pages":"Pages 10-12"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70033-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134686665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-01DOI: 10.1016/S1754-4548(11)70037-7
Stephen Pritchard
With the RSA security breach still fresh in the minds of information security practitioners across the world, you'd be forgiven for assuming that the heyday for token-based ID is long gone. Stephen Pritchard investigates the advantages and disadvantages of token-based ID and finds out why, for now at least, it's here to stay
{"title":"Life After Breach","authors":"Stephen Pritchard","doi":"10.1016/S1754-4548(11)70037-7","DOIUrl":"10.1016/S1754-4548(11)70037-7","url":null,"abstract":"<div><p>With the RSA security breach still fresh in the minds of information security practitioners across the world, you'd be forgiven for assuming that the heyday for token-based ID is long gone. Stephen Pritchard investigates the advantages and disadvantages of token-based ID and finds out why, for now at least, it's here to stay</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 3","pages":"Pages 28-31"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70037-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83057412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}