InfosecurityPub Date : 2011-01-01DOI: 10.1016/S1754-4548(11)70012-2
Jason Creasey, John Colley
{"title":"Joining Forces to Support the Security Profession","authors":"Jason Creasey, John Colley","doi":"10.1016/S1754-4548(11)70012-2","DOIUrl":"10.1016/S1754-4548(11)70012-2","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Page 43"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70012-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84812031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-01-01DOI: 10.1016/S1754-4548(11)70013-4
{"title":"Come Together","authors":"","doi":"10.1016/S1754-4548(11)70013-4","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70013-4","url":null,"abstract":"<div><p>This year's Infosecurity Europe show, which is attracting registrations from new and old visitors alike, will take place at London's Earls Court exhibition center on April 19th – 21st.</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Pages 44-45"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70013-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137083474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2010-11-01DOI: 10.1016/S1754-4548(10)70096-6
{"title":"Spam decreasing, but social media phishing soaring says Symantec","authors":"","doi":"10.1016/S1754-4548(10)70096-6","DOIUrl":"https://doi.org/10.1016/S1754-4548(10)70096-6","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"7 6","pages":"Page 6"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(10)70096-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91979918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2010-11-01DOI: 10.1016/S1754-4548(10)70106-6
Stephen Pritchard
{"title":"PCI update: Your guide to Version 2.0","authors":"Stephen Pritchard","doi":"10.1016/S1754-4548(10)70106-6","DOIUrl":"10.1016/S1754-4548(10)70106-6","url":null,"abstract":"<div><p>The PCI Security Standards Council released the latest version of its standards in October 2010. <strong>Stephen Pritchard</strong> looks at how businesses can bring their operations in line with the new requirements</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"7 6","pages":"Pages 18-20"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(10)70106-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"95264462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2010-11-01DOI: 10.1016/S1754-4548(10)70099-1
{"title":"Google Android security exploit made public by researcher","authors":"","doi":"10.1016/S1754-4548(10)70099-1","DOIUrl":"https://doi.org/10.1016/S1754-4548(10)70099-1","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"7 6","pages":"Page 7"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(10)70099-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92008708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2010-11-01DOI: 10.1016/S1754-4548(10)70105-4
Kevin Townsend
{"title":"Selling biometrics to the masses","authors":"Kevin Townsend","doi":"10.1016/S1754-4548(10)70105-4","DOIUrl":"10.1016/S1754-4548(10)70105-4","url":null,"abstract":"<div><p><span>The biometrics industry may not always get good press, but at least it's still getting press. In the aftermath of the Biometrics 2010 conference, </span><strong>Kevin Townsend</strong> takes a look at what's right and wrong with the technology, and how its future is taking shape</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"7 6","pages":"Pages 14-17"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(10)70105-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90921635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2010-11-01DOI: 10.1016/S1754-4548(10)70104-2
Eleanor Dallaway
{"title":"Ray Stanton","authors":"Eleanor Dallaway","doi":"10.1016/S1754-4548(10)70104-2","DOIUrl":"https://doi.org/10.1016/S1754-4548(10)70104-2","url":null,"abstract":"<div><p>Straight-talking, ambitious, and successful, Ray Stanton is always a pleasure to talk to. Eleanor Dallaway sits down with Stanton to discuss his past, his career, and his goals.</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"7 6","pages":"Pages 10-13"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(10)70104-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92008706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}