InfosecurityPub Date : 2011-09-01DOI: 10.1016/S1754-4548(11)70068-7
Ted Kritsonis
{"title":"Breaking the Online Bank","authors":"Ted Kritsonis","doi":"10.1016/S1754-4548(11)70068-7","DOIUrl":"10.1016/S1754-4548(11)70068-7","url":null,"abstract":"<div><p>As technology and online behaviors change, so too do methods to compromise a person's — or organization's — most vital assets: their financial details. <strong>Ted Kritsonis</strong> examines how cyber thieves are adapting, and what the banks are doing to stop them</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 36-39"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70068-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"96806499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-07-01DOI: 10.1016/S1754-4548(11)70053-5
Danny Bradbury
{"title":"Security Vendors: Trend-Setters, or Trend Followers?","authors":"Danny Bradbury","doi":"10.1016/S1754-4548(11)70053-5","DOIUrl":"10.1016/S1754-4548(11)70053-5","url":null,"abstract":"<div><p>How far ahead of the curve – or behind it – are vendors when it comes to identifying security trends? <strong>Danny Bradbury</strong> finds out that the curve may not matter at all</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 4","pages":"Pages 32-35"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70053-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"110913112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-07-01DOI: 10.1016/S1754-4548(11)70049-3
Stephen Prichard
{"title":"The Truth About DLP","authors":"Stephen Prichard","doi":"10.1016/S1754-4548(11)70049-3","DOIUrl":"10.1016/S1754-4548(11)70049-3","url":null,"abstract":"<div><p><span>Data loss prevention: the term that fills marketing managers with joy, and infosec managers with dread. Preventing a data leak may be the top priority for the IT security team, but is DLP technology mature, and cost effective enough, to be the answer? </span><strong>Stephen Pritchard</strong> reports</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 4","pages":"Pages 18-21"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70049-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88180992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-07-01DOI: 10.1016/S1754-4548(11)70050-X
Cath Everett
{"title":"AV: Life in the Old Dog?","authors":"Cath Everett","doi":"10.1016/S1754-4548(11)70050-X","DOIUrl":"10.1016/S1754-4548(11)70050-X","url":null,"abstract":"<div><p>Once upon a time, anti-virus technology was a well-coveted standalone product. These days, it is often considered a commodity that can be adequately built into a UTM offering. <strong>Cath Everett</strong> investigates whether or not a market for standalone anti-virus technology still exists</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 4","pages":"Pages 22-25"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70050-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80611469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-07-01DOI: 10.1016/S1754-4548(11)70045-6
Eleanor Dallaway (Editor)
{"title":"Come Together","authors":"Eleanor Dallaway (Editor)","doi":"10.1016/S1754-4548(11)70045-6","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70045-6","url":null,"abstract":"<div><p>My last editorial was all about change. I wrote that uncertainty was the biggest certainty we have in this industry, and to (bizarrely) quote myself, “Change will happen, and it will do so because whatever preceded ‘it’ was imperfect”. In the two months since the May/June issue was published, <em>Infosecurity</em> magazine has been through some exciting changes of its own.</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 4","pages":"Page 5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70045-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136459179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-07-01DOI: 10.1016/S1754-4548(11)70051-1
{"title":"Cashing in on Security Training","authors":"","doi":"10.1016/S1754-4548(11)70051-1","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70051-1","url":null,"abstract":"<div><p>At long last, a cybersecurity career field has emerged. The <strong>(ISC)<sup>2</sup> US Government Advisory Board Executive Writers Bureau</strong> examines where employment opportunities lie and how much you can expect to be paid in this very important sector</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 4","pages":"Pages 26-28"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70051-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136530582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-07-01DOI: 10.1016/S1754-4548(11)70054-7
Davey Winder
{"title":"The State of Smartphone Security","authors":"Davey Winder","doi":"10.1016/S1754-4548(11)70054-7","DOIUrl":"10.1016/S1754-4548(11)70054-7","url":null,"abstract":"<div><p>An awful lot of lip service has been paid to smartphone security. Whereas most industry experts agree that, to date at least, smartphone security threats are mainly hype, that doesn't mean this won't change. <strong>Davey Winder</strong> investigates…</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 4","pages":"Pages 36-39"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70054-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77544698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-07-01DOI: 10.1016/S1754-4548(11)70048-1
Esther Shein
{"title":"Biometrics: How and Now?","authors":"Esther Shein","doi":"10.1016/S1754-4548(11)70048-1","DOIUrl":"10.1016/S1754-4548(11)70048-1","url":null,"abstract":"<div><p><span>Using biometric data<span> for identity access and management can be a controversial move. </span></span><strong>Esther Shein</strong><span> examines the drawbacks, and looks at where and how biometrics are currently being used</span></p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 4","pages":"Pages 14-17"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70048-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75986832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-07-01DOI: 10.1016/S1754-4548(11)70056-0
Hugh H. Penri-Williams
{"title":"Nice Idea, Shame About the Outcome","authors":"Hugh H. Penri-Williams","doi":"10.1016/S1754-4548(11)70056-0","DOIUrl":"10.1016/S1754-4548(11)70056-0","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 4","pages":"Page 45"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70056-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"99764276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-07-01DOI: 10.1016/S1754-4548(11)70046-8
Drew Amorosi
{"title":"Rotting Apple","authors":"Drew Amorosi","doi":"10.1016/S1754-4548(11)70046-8","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70046-8","url":null,"abstract":"<div><p><span>Vendors, analysts, and commentators alike have long predicted a surge in malware affecting Apple's products. Yet, until recently, these prognostications have failed to materialize. </span><strong>Drew Amorosi</strong> examines recent malware threats to Apple's OS X operating system to find out if this is an anomaly, or a sign of things to come</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 4","pages":"Pages 6-9"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70046-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136493532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}