InfosecurityPub Date : 2011-11-01Epub Date: 2011-12-15DOI: 10.1016/S1754-4548(11)70085-7
Wendy M. Grossman
{"title":"A Superior Education","authors":"Wendy M. Grossman","doi":"10.1016/S1754-4548(11)70085-7","DOIUrl":"10.1016/S1754-4548(11)70085-7","url":null,"abstract":"<div><p>As the information security industry becomes more coveted, <strong>Wendy M. Grossman</strong> takes a look at the university courses available to aspiring and competing infosec professionals on both sides of the Atlantic</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Pages 40-43"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70085-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"95387020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-11-01Epub Date: 2011-12-15DOI: 10.1016/S1754-4548(11)70081-X
Davey Winder
{"title":"Infosecurity: Do You Eat Your Own Dog Food?","authors":"Davey Winder","doi":"10.1016/S1754-4548(11)70081-X","DOIUrl":"10.1016/S1754-4548(11)70081-X","url":null,"abstract":"<div><p>How many traffic policemen never exceed the speed limit when off duty? How many vicars don't swear? And how many IT security professionals practice what they preach? No, seriously, do you eat your own dog food? That's the question <strong>Davey Winder</strong> has been asking of infosec professionals in an attempt to determine just how secure security experts really are away from the office</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Pages 26-29"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70081-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86850340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-11-01Epub Date: 2011-12-15DOI: 10.1016/S1754-4548(11)70080-8
Fred Donovan
{"title":"Compliance Strategies – A.K.A. Alphabet Soup","authors":"Fred Donovan","doi":"10.1016/S1754-4548(11)70080-8","DOIUrl":"10.1016/S1754-4548(11)70080-8","url":null,"abstract":"<div><p>Does your organization follow a recipe, or simply ‘eye-up’ the ingredients to your compliance tick boxes? <strong>Fred Donovan</strong> taste-tests what is often viewed as the unsavory side of the information security profession</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Pages 22-25"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70080-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83388686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-11-01Epub Date: 2011-12-15DOI: 10.1016/S1754-4548(11)70082-1
The (ISC)2 US Government Advisory Board Executive Writers Bureau
{"title":"The Good, the Bad, and the Ugly Insider Threats","authors":"The (ISC)2 US Government Advisory Board Executive Writers Bureau","doi":"10.1016/S1754-4548(11)70082-1","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70082-1","url":null,"abstract":"<div><p>Whether intentional or unintentional, insider threats take many forms. <strong>The (ISC)<sup>2</sup> US Government Advisory Board Executive Writers Bureau</strong> examines this dichotomy and how it is being affected by both regulatory considerations, and the rapidly changing technology landscape</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Pages 30-32"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70082-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92005152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-11-01Epub Date: 2011-12-15DOI: 10.1016/S1754-4548(11)70079-1
Esther Shein
{"title":"Paging Doctor Compliance","authors":"Esther Shein","doi":"10.1016/S1754-4548(11)70079-1","DOIUrl":"10.1016/S1754-4548(11)70079-1","url":null,"abstract":"<div><p>With changes to the US healthcare system already underway – albeit at a snail's pace – now is the perfect time to examine how the regulatory and compliance landscape may change with it. <strong>Esther Shein</strong> surveys the sector and seeks the proper prescription</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Pages 16-20"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70079-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"106174616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-11-01Epub Date: 2011-12-15DOI: 10.1016/S1754-4548(11)70076-6
Drew Amorosi
{"title":"Chinese State of Denial","authors":"Drew Amorosi","doi":"10.1016/S1754-4548(11)70076-6","DOIUrl":"10.1016/S1754-4548(11)70076-6","url":null,"abstract":"<div><p>Hackers exist almost anywhere there is an internet connection, yet the Chinese government continues to downplay their existence at home. <strong>Drew Amorosi</strong> takes a journey of enlightenment and seeks the truth</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Pages 4-7"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70076-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79274925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-11-01Epub Date: 2011-12-15DOI: 10.1016/S1754-4548(11)70077-8
Fred Donovan
{"title":"Year of the Hack","authors":"Fred Donovan","doi":"10.1016/S1754-4548(11)70077-8","DOIUrl":"10.1016/S1754-4548(11)70077-8","url":null,"abstract":"<div><p>Commonly referred to as the year of the hack, it is no secret what 2011 has become famous for in the information security industry. This year's headlines, reports <strong>Fred Donovan</strong>, have been made up of data breaches, hacks, APT attacks and mergers and acquisitions</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Pages 8-10"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70077-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85263625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-11-01Epub Date: 2011-12-15DOI: 10.1016/S1754-4548(11)70084-5
Jim Mortleman
{"title":"Phone Hacking Scandal: Who's Getting the Message?","authors":"Jim Mortleman","doi":"10.1016/S1754-4548(11)70084-5","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70084-5","url":null,"abstract":"<div><p>In the wake of the tabloid cellphone hacking scandal, have operators really closed all the loopholes that let snoopers intercept our communications? <strong>Jim Mortleman</strong> investigates</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Pages 36-39"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70084-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92025894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}