InfosecurityPub Date : 2011-11-01DOI: 10.1016/S1754-4548(11)70077-8
Fred Donovan
{"title":"Year of the Hack","authors":"Fred Donovan","doi":"10.1016/S1754-4548(11)70077-8","DOIUrl":"10.1016/S1754-4548(11)70077-8","url":null,"abstract":"<div><p>Commonly referred to as the year of the hack, it is no secret what 2011 has become famous for in the information security industry. This year's headlines, reports <strong>Fred Donovan</strong>, have been made up of data breaches, hacks, APT attacks and mergers and acquisitions</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Pages 8-10"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70077-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85263625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-11-01DOI: 10.1016/S1754-4548(11)70083-3
Danny Bradbury
{"title":"Can Security and Privacy Co-exist?","authors":"Danny Bradbury","doi":"10.1016/S1754-4548(11)70083-3","DOIUrl":"10.1016/S1754-4548(11)70083-3","url":null,"abstract":"<div><p>Should you have to give up privacy to get more security, or does one actually support the other? <strong>Danny Bradbury</strong> sounds out the experts</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Pages 33-35"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70083-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91430429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-11-01DOI: 10.1016/S1754-4548(11)70087-0
Sarb Sembhi
{"title":"Almost What it Says on the Tin","authors":"Sarb Sembhi","doi":"10.1016/S1754-4548(11)70087-0","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70087-0","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Page 45"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70087-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92087336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-11-01DOI: 10.1016/S1754-4548(11)70075-4
Eleanor Dallaway (Editor)
{"title":"Moving on Up","authors":"Eleanor Dallaway (Editor)","doi":"10.1016/S1754-4548(11)70075-4","DOIUrl":"10.1016/S1754-4548(11)70075-4","url":null,"abstract":"<div><p>Within industry circles, 2011 has become known as the year of the hack, or the year of the black hat if you prefer. Game-changing malware has exploded, proving that the critical national infrastructure is under threat and that cyber war and cyber espionage are very daunting realities.</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Page 3"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70075-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89591080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-09-01DOI: 10.1016/S1754-4548(11)70065-1
Wendy M. Grossman
{"title":"Crossing Borders: The Right Side of Wrong?","authors":"Wendy M. Grossman","doi":"10.1016/S1754-4548(11)70065-1","DOIUrl":"10.1016/S1754-4548(11)70065-1","url":null,"abstract":"<div><p>Most nations consider travel data to be crucial to protecting national security. How that data is collected, stored, and secured however seems to be a closely guarded secret. <strong>Wendy M. Grossman</strong> investigates</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 22-25"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70065-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"112890616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-09-01DOI: 10.1016/S1754-4548(11)70062-6
Drew Amorosi
{"title":"Patricia Titus","authors":"Drew Amorosi","doi":"10.1016/S1754-4548(11)70062-6","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70062-6","url":null,"abstract":"<div><p>The road from Minnesota to Washington has many stops, especially when you take the scenic route. <strong>Drew Amorosi</strong> recently met Patricia Titus of Unisys to regale in her remarkable journey</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 9-12"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70062-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136736069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}