Pub Date : 2011-05-01DOI: 10.1016/S1754-4548(11)70041-9
John Colley
{"title":"IEDs Take on a New Meaning","authors":"John Colley","doi":"10.1016/S1754-4548(11)70041-9","DOIUrl":"10.1016/S1754-4548(11)70041-9","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 3","pages":"Page 45"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70041-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88413219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-01DOI: 10.1016/S1754-4548(11)70032-8
Drew Amorosi
Infosecurity's Drew Amorosi examines three data breach incidents from the past few months that, by their nature, keep security vendors in business, regulators busy, and CISOs up at night. Find out why industry observers think this rash of massive breaches could lead to a ‘PCI for consumer privacy’
{"title":"Data Breach Spring","authors":"Drew Amorosi","doi":"10.1016/S1754-4548(11)70032-8","DOIUrl":"10.1016/S1754-4548(11)70032-8","url":null,"abstract":"<div><p><em>Infosecurity</em>'s Drew Amorosi examines three data breach incidents from the past few months that, by their nature, keep security vendors in business, regulators busy, and CISOs up at night. Find out why industry observers think this rash of massive breaches could lead to a ‘PCI for consumer privacy’</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 3","pages":"Pages 6-9"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70032-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82672135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-01DOI: 10.1016/S1754-4548(11)70042-0
Raj Samani
{"title":"Essential Reading, But Direction Needed","authors":"Raj Samani","doi":"10.1016/S1754-4548(11)70042-0","DOIUrl":"10.1016/S1754-4548(11)70042-0","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 3","pages":"Page 46"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70042-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"93347477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-01DOI: 10.1016/S1754-4548(11)70031-6
Eleanor Dallaway (Editor)
For all my sins, I was recently asked by an industry colleague to give a lecture on the past and future of the information security industry to computer science students at the University of Surrey.
最近,一位业内同事邀请我为萨里大学(University of Surrey)计算机科学专业的学生做一场关于信息安全行业的过去和未来的讲座。
{"title":"Talkin' Bout a Revolution","authors":"Eleanor Dallaway (Editor)","doi":"10.1016/S1754-4548(11)70031-6","DOIUrl":"10.1016/S1754-4548(11)70031-6","url":null,"abstract":"<div><p>For all my sins, I was recently asked by an industry colleague to give a lecture on the past and future of the information security industry to computer science students at the University of Surrey.</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 3","pages":"Page 5"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70031-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120392954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-01DOI: 10.1016/S1754-4548(11)70035-3
The (ISC)2 US Government Advisory Board Executive Writers Bureau shares its wisdom and experiences from the perspective of career-IT and IT security professionals by focusing on the keys to a successful career. Read on for advice on how younger professionals can get the best out of this rewarding profession
{"title":"Seven Crucial Infosec Career Steps","authors":"","doi":"10.1016/S1754-4548(11)70035-3","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70035-3","url":null,"abstract":"<div><p>The (ISC)<sup>2</sup> US Government Advisory Board Executive Writers Bureau shares its wisdom and experiences from the perspective of career-IT and IT security professionals by focusing on the keys to a successful career. Read on for advice on how younger professionals can get the best out of this rewarding profession</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 3","pages":"Pages 20-23"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70035-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134840001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-01DOI: 10.1016/S1754-4548(11)70033-X
Drew Amorosi
BT's Bruce Schneier has made a reputation for himself by exploring the unconventional sides of security. Drew Amorosi sat down with this industry luminary to gain a greater understanding of the man and, briefly, dive into the mind and life that is Bruce Schneier…
{"title":"Bruce Schneier","authors":"Drew Amorosi","doi":"10.1016/S1754-4548(11)70033-X","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70033-X","url":null,"abstract":"<div><p>BT's Bruce Schneier has made a reputation for himself by exploring the unconventional sides of security. Drew Amorosi sat down with this industry luminary to gain a greater understanding of the man and, briefly, dive into the mind and life that is Bruce Schneier…</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 3","pages":"Pages 10-12"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70033-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134686665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-05-01DOI: 10.1016/S1754-4548(11)70039-0
Kevin Townsend
While many experts agree that whitelisting provides superior security to that of its antonym, blacklisting, there are concerns over its practicality and usability. Kevin Townsend puts the technologies head to head
{"title":"Does it Matter if It's Black or White?","authors":"Kevin Townsend","doi":"10.1016/S1754-4548(11)70039-0","DOIUrl":"10.1016/S1754-4548(11)70039-0","url":null,"abstract":"<div><p>While many experts agree that whitelisting provides superior security to that of its antonym, blacklisting, there are concerns over its practicality and usability. Kevin Townsend puts the technologies head to head</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 3","pages":"Pages 36-39"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70039-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84671527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}