InfosecurityPub Date : 2011-05-01DOI: 10.1016/S1754-4548(11)70041-9
John Colley
{"title":"IEDs Take on a New Meaning","authors":"John Colley","doi":"10.1016/S1754-4548(11)70041-9","DOIUrl":"10.1016/S1754-4548(11)70041-9","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 3","pages":"Page 45"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70041-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88413219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-05-01DOI: 10.1016/S1754-4548(11)70032-8
Drew Amorosi
{"title":"Data Breach Spring","authors":"Drew Amorosi","doi":"10.1016/S1754-4548(11)70032-8","DOIUrl":"10.1016/S1754-4548(11)70032-8","url":null,"abstract":"<div><p><em>Infosecurity</em>'s Drew Amorosi examines three data breach incidents from the past few months that, by their nature, keep security vendors in business, regulators busy, and CISOs up at night. Find out why industry observers think this rash of massive breaches could lead to a ‘PCI for consumer privacy’</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 3","pages":"Pages 6-9"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70032-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82672135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-05-01DOI: 10.1016/S1754-4548(11)70042-0
Raj Samani
{"title":"Essential Reading, But Direction Needed","authors":"Raj Samani","doi":"10.1016/S1754-4548(11)70042-0","DOIUrl":"10.1016/S1754-4548(11)70042-0","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 3","pages":"Page 46"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70042-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"93347477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-05-01DOI: 10.1016/S1754-4548(11)70031-6
Eleanor Dallaway (Editor)
{"title":"Talkin' Bout a Revolution","authors":"Eleanor Dallaway (Editor)","doi":"10.1016/S1754-4548(11)70031-6","DOIUrl":"10.1016/S1754-4548(11)70031-6","url":null,"abstract":"<div><p>For all my sins, I was recently asked by an industry colleague to give a lecture on the past and future of the information security industry to computer science students at the University of Surrey.</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 3","pages":"Page 5"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70031-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120392954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-05-01DOI: 10.1016/S1754-4548(11)70035-3
{"title":"Seven Crucial Infosec Career Steps","authors":"","doi":"10.1016/S1754-4548(11)70035-3","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70035-3","url":null,"abstract":"<div><p>The (ISC)<sup>2</sup> US Government Advisory Board Executive Writers Bureau shares its wisdom and experiences from the perspective of career-IT and IT security professionals by focusing on the keys to a successful career. Read on for advice on how younger professionals can get the best out of this rewarding profession</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 3","pages":"Pages 20-23"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70035-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134840001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-05-01DOI: 10.1016/S1754-4548(11)70033-X
Drew Amorosi
{"title":"Bruce Schneier","authors":"Drew Amorosi","doi":"10.1016/S1754-4548(11)70033-X","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70033-X","url":null,"abstract":"<div><p>BT's Bruce Schneier has made a reputation for himself by exploring the unconventional sides of security. Drew Amorosi sat down with this industry luminary to gain a greater understanding of the man and, briefly, dive into the mind and life that is Bruce Schneier…</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 3","pages":"Pages 10-12"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70033-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134686665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-05-01DOI: 10.1016/S1754-4548(11)70039-0
Kevin Townsend
{"title":"Does it Matter if It's Black or White?","authors":"Kevin Townsend","doi":"10.1016/S1754-4548(11)70039-0","DOIUrl":"10.1016/S1754-4548(11)70039-0","url":null,"abstract":"<div><p>While many experts agree that whitelisting provides superior security to that of its antonym, blacklisting, there are concerns over its practicality and usability. Kevin Townsend puts the technologies head to head</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 3","pages":"Pages 36-39"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70039-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84671527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}