InfosecurityPub Date : 2011-09-01DOI: 10.1016/S1754-4548(11)70060-2
Eleanor Dallaway (Editor)
{"title":"Someone Like You","authors":"Eleanor Dallaway (Editor)","doi":"10.1016/S1754-4548(11)70060-2","DOIUrl":"10.1016/S1754-4548(11)70060-2","url":null,"abstract":"<div><p>We often talk about the importance of education in this industry — we ponder how best to educate our staff, and how to raise awareness about information security. What we dedicate less time to, at least as far as I'm aware, is how to nurture a new generation of information security professionals.</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Page 5"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70060-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"100027343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-09-01DOI: 10.1016/S1754-4548(11)70070-5
Steve Brunswick
{"title":"EU Notification Law Is Not Enough","authors":"Steve Brunswick","doi":"10.1016/S1754-4548(11)70070-5","DOIUrl":"10.1016/S1754-4548(11)70070-5","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Page 44"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70070-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80321231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-09-01DOI: 10.1016/S1754-4548(11)70064-X
Adrian Davis
{"title":"What Is Critical to Your Infrastructure?","authors":"Adrian Davis","doi":"10.1016/S1754-4548(11)70064-X","DOIUrl":"10.1016/S1754-4548(11)70064-X","url":null,"abstract":"<div><p>Critical infrastructure means many things to many people. <strong>Adrian Davis</strong>, principal research analyst with the Information Security Forum (ISF), explains why determining which infrastructure elements are critical to a business is the first step in keeping them safe</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 18-21"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70064-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85351235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-09-01DOI: 10.1016/S1754-4548(11)70066-3
Fred Donovan
{"title":"Obstacles Facing the US Cybersecurity Initiatve","authors":"Fred Donovan","doi":"10.1016/S1754-4548(11)70066-3","DOIUrl":"10.1016/S1754-4548(11)70066-3","url":null,"abstract":"<div><p>Although the US government is paying more attention than ever to the issue of cybersecurity, the recent battles in Washington over budgets and austerity measures mean that funding could potentially dry up in an instant. <strong>Fred Donovan</strong> surveys the experts to get their take on where the nation's cybersecurity program is heading</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 26-30"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70066-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76731162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-09-01DOI: 10.1016/S1754-4548(11)70063-8
Danny Bradbury
{"title":"The Spy Who Hacked Me","authors":"Danny Bradbury","doi":"10.1016/S1754-4548(11)70063-8","DOIUrl":"10.1016/S1754-4548(11)70063-8","url":null,"abstract":"<div><p>James Bond was more of a jock than a nerd, and he probably wouldn't have known how to use a computer, says <strong>Danny Bradbury</strong>. How things have changed…</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 14-17"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70063-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78048900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-09-01DOI: 10.1016/S1754-4548(11)70067-5
Stephen Pritchard
{"title":"Security Education: A Lesson Learned?","authors":"Stephen Pritchard","doi":"10.1016/S1754-4548(11)70067-5","DOIUrl":"10.1016/S1754-4548(11)70067-5","url":null,"abstract":"<div><p>Despite users being the most integral part of information security, only one to two percent of security budgets are being spent on awareness and education. <strong>Stephen Pritchard</strong> reports</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 31-34"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70067-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"94847294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-09-01DOI: 10.1016/S1754-4548(11)70069-9
Davey Winder
{"title":"Persistent and Evasive Attacks Uncovered","authors":"Davey Winder","doi":"10.1016/S1754-4548(11)70069-9","DOIUrl":"10.1016/S1754-4548(11)70069-9","url":null,"abstract":"<div><p><span>APTs – and more recently AETs – have divided industry experts in opinion and often been used to scaremonger. </span><strong>Davey Winder</strong><span> reveals the truth behind the APT and AET headlines</span></p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 40-43"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70069-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80765727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-09-01DOI: 10.1016/S1754-4548(11)70061-4
Drew Amorosi
{"title":"You Dirty RAT","authors":"Drew Amorosi","doi":"10.1016/S1754-4548(11)70061-4","DOIUrl":"10.1016/S1754-4548(11)70061-4","url":null,"abstract":"<div><p>The latest APT to come to light is what McAfee has dubbed ‘Shady RAT’. But the folks at Kaspersky have voiced some objections. <strong>Drew Amorosi</strong> examines the threat…and the controversy</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 6-8"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70061-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87192676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}