InfosecurityPub Date : 2011-11-01Epub Date: 2011-12-15DOI: 10.1016/S1754-4548(11)70078-X
Eleanor Dallaway
{"title":"Hord Tipton","authors":"Eleanor Dallaway","doi":"10.1016/S1754-4548(11)70078-X","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70078-X","url":null,"abstract":"<div><p>Within only a minute of sitting down with Hord Tipton, executive director of (ISC)<sup>2</sup>, our own <strong>Eleanor Dallaway</strong> knew that the hour she had booked with him would not be adequate. You see, it's impossible to capture the true essence of a man with a career that many can only dream of in 60 minutes. While they may have been short for time, Tipton, however, certainly wasn't short on stories</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Pages 11-14"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70078-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92005151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-11-01Epub Date: 2011-12-15DOI: 10.1016/S1754-4548(11)70087-0
Sarb Sembhi
{"title":"Almost What it Says on the Tin","authors":"Sarb Sembhi","doi":"10.1016/S1754-4548(11)70087-0","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70087-0","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Page 45"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70087-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92087336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-11-01Epub Date: 2011-12-15DOI: 10.1016/S1754-4548(11)70083-3
Danny Bradbury
{"title":"Can Security and Privacy Co-exist?","authors":"Danny Bradbury","doi":"10.1016/S1754-4548(11)70083-3","DOIUrl":"10.1016/S1754-4548(11)70083-3","url":null,"abstract":"<div><p>Should you have to give up privacy to get more security, or does one actually support the other? <strong>Danny Bradbury</strong> sounds out the experts</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Pages 33-35"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70083-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91430429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-11-01Epub Date: 2011-12-15DOI: 10.1016/S1754-4548(11)70075-4
Eleanor Dallaway (Editor)
{"title":"Moving on Up","authors":"Eleanor Dallaway (Editor)","doi":"10.1016/S1754-4548(11)70075-4","DOIUrl":"10.1016/S1754-4548(11)70075-4","url":null,"abstract":"<div><p>Within industry circles, 2011 has become known as the year of the hack, or the year of the black hat if you prefer. Game-changing malware has exploded, proving that the critical national infrastructure is under threat and that cyber war and cyber espionage are very daunting realities.</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Page 3"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70075-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89591080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-09-01Epub Date: 2011-10-12DOI: 10.1016/S1754-4548(11)70062-6
Drew Amorosi
{"title":"Patricia Titus","authors":"Drew Amorosi","doi":"10.1016/S1754-4548(11)70062-6","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70062-6","url":null,"abstract":"<div><p>The road from Minnesota to Washington has many stops, especially when you take the scenic route. <strong>Drew Amorosi</strong> recently met Patricia Titus of Unisys to regale in her remarkable journey</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 9-12"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70062-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136736069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-09-01Epub Date: 2011-10-12DOI: 10.1016/S1754-4548(11)70065-1
Wendy M. Grossman
{"title":"Crossing Borders: The Right Side of Wrong?","authors":"Wendy M. Grossman","doi":"10.1016/S1754-4548(11)70065-1","DOIUrl":"10.1016/S1754-4548(11)70065-1","url":null,"abstract":"<div><p>Most nations consider travel data to be crucial to protecting national security. How that data is collected, stored, and secured however seems to be a closely guarded secret. <strong>Wendy M. Grossman</strong> investigates</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 22-25"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70065-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"112890616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}