InfosecurityPub Date : 2011-01-01DOI: 10.1016/S1754-4548(11)70010-9
Danny Bradbury
{"title":"Mob Mentalities","authors":"Danny Bradbury","doi":"10.1016/S1754-4548(11)70010-9","DOIUrl":"10.1016/S1754-4548(11)70010-9","url":null,"abstract":"<div><p>Many hands may make light work, but do they also introduce more risk? <strong>Danny Bradbury</strong> explores the thorny issue of security in crowdsourced software development</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Pages 38-41"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70010-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"99969310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-01-01DOI: 10.1016/S1754-4548(11)70011-0
Anthony Haywood
{"title":"Rewards for Hacking – Good, Bad or Ugly?","authors":"Anthony Haywood","doi":"10.1016/S1754-4548(11)70011-0","DOIUrl":"10.1016/S1754-4548(11)70011-0","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Page 42"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70011-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"93858906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-01-01DOI: 10.1016/S1754-4548(11)70008-0
Davey Winder
{"title":"Unsporting Espionage","authors":"Davey Winder","doi":"10.1016/S1754-4548(11)70008-0","DOIUrl":"10.1016/S1754-4548(11)70008-0","url":null,"abstract":"<div><p>With the 2012 Olympics fast approaching, <strong>Davey Winder</strong> takes a look at the growing problem of IP espionage in the big, expensive world of sport…</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Pages 31-33"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70008-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74575191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-01-01DOI: 10.1016/S1754-4548(11)70003-1
Drew Amorosi
{"title":"Michael Higgins","authors":"Drew Amorosi","doi":"10.1016/S1754-4548(11)70003-1","DOIUrl":"10.1016/S1754-4548(11)70003-1","url":null,"abstract":"<div><p>Easygoing, engaging, and ready with a firm handshake, Michael Higgins of the <em>New York Times</em> bucks the stereotypes when one thinks of how an executive with years of experience in the military and intelligence communities might be perceived. <strong>Drew Amorosi</strong><span> sat down with the news organization's chief security officer to gain insight on how a top-notch media company maintains its defenses</span></p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Pages 10-13"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70003-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83702394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-01-01DOI: 10.1016/S1754-4548(11)70004-3
Stephen Pritchard
{"title":"Keeping Tabs on Your Data's Address","authors":"Stephen Pritchard","doi":"10.1016/S1754-4548(11)70004-3","DOIUrl":"10.1016/S1754-4548(11)70004-3","url":null,"abstract":"<div><p><span>Location, location, location. It's a slogan that has deep meaning for the real estate market, but it also maintains significant relevance to the regulatory and compliance risks associated with cloud computing in the era of globalization. </span><strong>Stephen Pritchard</strong> investigates</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Pages 15-19"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70004-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80823754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-01-01DOI: 10.1016/S1754-4548(11)70009-2
Drew Amorosi
{"title":"Look Back and Move Forward","authors":"Drew Amorosi","doi":"10.1016/S1754-4548(11)70009-2","DOIUrl":"10.1016/S1754-4548(11)70009-2","url":null,"abstract":"<div><p>The beginning of a new year is often a time for predictions or, sometimes, reassertions. <strong>Drew Amorosi</strong> revisits past prognostications from <em>Infosecurity</em>'s editorial board to assess its foretelling prowess, examine the year that was 2010, and gather some new projections for 2011 and beyond</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Pages 34-37"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70009-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"109411444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-01-01DOI: 10.1016/S1754-4548(11)70005-5
Ted Kritsonis
{"title":"Security Risks in the Cloud – Reality, or A Broken Record?","authors":"Ted Kritsonis","doi":"10.1016/S1754-4548(11)70005-5","DOIUrl":"10.1016/S1754-4548(11)70005-5","url":null,"abstract":"<div><p>The cost savings of cloud computing versus the anticipated security risks: it's the broken record that seems to be on continuous loop for security professionals contemplating their stragegy. Ted Kritsonis examines the key considerations</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Pages 20-23"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70005-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85727463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-01-01DOI: 10.1016/S1754-4548(11)70001-8
Eleanor Dallaway (Editor)
{"title":"I Guess That's Why They Call it The Blues","authors":"Eleanor Dallaway (Editor)","doi":"10.1016/S1754-4548(11)70001-8","DOIUrl":"10.1016/S1754-4548(11)70001-8","url":null,"abstract":"<div><p>Each year, January brings many expected happenings and issues; most of which I regard with much disdain. In addition to the post-Christmas blues, the miserable weather, the fast-abandoned new year's resolutions, and the frantic and often misplaced desire to start afresh, it also encourages predictions.</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Page 5"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70001-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"107193594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
InfosecurityPub Date : 2011-01-01DOI: 10.1016/S1754-4548(11)70006-7
Kevin Townsend
{"title":"The Great Data Center Debate","authors":"Kevin Townsend","doi":"10.1016/S1754-4548(11)70006-7","DOIUrl":"10.1016/S1754-4548(11)70006-7","url":null,"abstract":"<div><p>Handing over your data to a cloud provider may appear almost irresistible from a cost perspective, but what about the security and compliance concerns? Kevin Townsend examines both sides of the argument</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Pages 24-27"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70006-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88410106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}