InfosecurityPub Date : 2011-05-01DOI: 10.1016/S1754-4548(11)70034-1
Wendy M. Grossman
{"title":"The CISO Pilgrimage","authors":"Wendy M. Grossman","doi":"10.1016/S1754-4548(11)70034-1","DOIUrl":"10.1016/S1754-4548(11)70034-1","url":null,"abstract":"<div><p>In much the same way that the role of a CISO has evolved, so has the journey to get there. Wendy M. Grossman looks at what steps an aspiring CISO must take to get themselves from school to the board room</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 3","pages":"Pages 16-19"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70034-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120307847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-05-01DOI: 10.1016/S1754-4548(11)70037-7
Stephen Pritchard
{"title":"Life After Breach","authors":"Stephen Pritchard","doi":"10.1016/S1754-4548(11)70037-7","DOIUrl":"10.1016/S1754-4548(11)70037-7","url":null,"abstract":"<div><p>With the RSA security breach still fresh in the minds of information security practitioners across the world, you'd be forgiven for assuming that the heyday for token-based ID is long gone. Stephen Pritchard investigates the advantages and disadvantages of token-based ID and finds out why, for now at least, it's here to stay</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 3","pages":"Pages 28-31"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70037-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83057412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-03-01DOI: 10.1016/S1754-4548(11)70018-3
Drew Amorosi
{"title":"Time to Avoid the Droid?","authors":"Drew Amorosi","doi":"10.1016/S1754-4548(11)70018-3","DOIUrl":"10.1016/S1754-4548(11)70018-3","url":null,"abstract":"<div><p>Finally, hype has matched reality in the world of mobile security. Drew Amorosi chronicles the recent ups and downs of the bustling Android Market to find out why it is in the crosshairs of the security industry</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Pages 6-9"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70018-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74091769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-03-01DOI: 10.1016/S1754-4548(11)70023-7
Esther Shein
{"title":"The Gods of Phishing","authors":"Esther Shein","doi":"10.1016/S1754-4548(11)70023-7","DOIUrl":"10.1016/S1754-4548(11)70023-7","url":null,"abstract":"<div><p>Some phishing attempts are truly ethereal – near flawless representations of official communications. Others, however, are mere mortals. And then there's the absolutely absurd. Esther Shein visits the pantheon of scammer emails</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Pages 28-31"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70023-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91461572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-03-01DOI: 10.1016/S1754-4548(11)70022-5
Stephen Pritchard
{"title":"The Rise and Fall of Online Credit Fraud","authors":"Stephen Pritchard","doi":"10.1016/S1754-4548(11)70022-5","DOIUrl":"10.1016/S1754-4548(11)70022-5","url":null,"abstract":"<div><p>While Chip and Pin technology has certainly decreased in-store fraud, it has also re-directed criminals' attention to online banks and shoppers. Stephen Pritchard investigates what methods cybercriminals<span> are using to steal credit card data, and reports on how the finance sector is fighting back</span></p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Pages 24-27"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70022-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76724617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-03-01DOI: 10.1016/S1754-4548(11)70020-1
Danny Bradbury
{"title":"The World's Dumbest Hackers","authors":"Danny Bradbury","doi":"10.1016/S1754-4548(11)70020-1","DOIUrl":"10.1016/S1754-4548(11)70020-1","url":null,"abstract":"<div><p>The world's smartest hackers are often the dumbest. Danny Bradbury introduces the seven deadly sins of hacking, and finds out what happens when a hacker's heart rules their head</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Pages 16-19"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70020-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"99862118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-03-01DOI: 10.1016/S1754-4548(11)70026-2
Wendy M. Grossman
{"title":"Researching the Researchers","authors":"Wendy M. Grossman","doi":"10.1016/S1754-4548(11)70026-2","DOIUrl":"10.1016/S1754-4548(11)70026-2","url":null,"abstract":"<div><p>The security industry doesn't have it easy. For every virus it detects and prevents, several new ones are being designed for maximum impact and damage. Information security researchers are up against a deluge of malware writers. Wendy M. Grossman reports on how they keep up</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Pages 40-43"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70026-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80556031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-03-01DOI: 10.1016/S1754-4548(11)70025-0
Kevin Townsend
{"title":"The Infosec Market in China: Proceed with Caution","authors":"Kevin Townsend","doi":"10.1016/S1754-4548(11)70025-0","DOIUrl":"10.1016/S1754-4548(11)70025-0","url":null,"abstract":"<div><p>Set to become the second largest economy in the world, China has the money and the people to make information security companies very profitable indeed. Kevin Townsend investigates the Chinese data and privacy culture and the regulations that make ‘cracking’ China a huge challenge for information security businesses</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Pages 35-38"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70025-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85832031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}