Infosecurity TodayPub Date : 2006-05-01DOI: 10.1016/S1742-6847(06)70418-9
{"title":"Slack space","authors":"","doi":"10.1016/S1742-6847(06)70418-9","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70418-9","url":null,"abstract":"<div><p>Welcome to Slack Space, our regular column by industry insider Slack Alice. Chip and PIN fraud, SSL decryption, and CALEA are on her lunch-time gossip menu this time round.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Page 47"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70418-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136531855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-05-01DOI: 10.1016/S1742-6847(06)70406-2
Ian Grant
{"title":"Telecoms – convergence challenge","authors":"Ian Grant","doi":"10.1016/S1742-6847(06)70406-2","DOIUrl":"10.1016/S1742-6847(06)70406-2","url":null,"abstract":"<div><p>Churchill said, “Give us the tools and we will finish the job.” We have the infosecurity tools, but the job of managing infosecurity in an age of converged digital networks is only just beginning.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Pages 19-21"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70406-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76863315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-05-01DOI: 10.1016/S1742-6847(06)70398-6
Brian McKenna
{"title":"The ‘big con’ for the information age","authors":"Brian McKenna","doi":"10.1016/S1742-6847(06)70398-6","DOIUrl":"10.1016/S1742-6847(06)70398-6","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Page 3"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70398-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74401593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-05-01DOI: 10.1016/S1742-6847(06)70408-6
Mick James
{"title":"Aping to defraud – corporate identities at stake","authors":"Mick James","doi":"10.1016/S1742-6847(06)70408-6","DOIUrl":"10.1016/S1742-6847(06)70408-6","url":null,"abstract":"<div><p>There are plenty of scam artists willing to shame your name by trading on your reputation. It takes a concerted effort to stop these corporate ID thieves.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Pages 24-26"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70408-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73433424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-05-01DOI: 10.1016/S1742-6847(06)70412-8
Angus McIlwraith
{"title":"Industry matures at Infosecurity Europe","authors":"Angus McIlwraith","doi":"10.1016/S1742-6847(06)70412-8","DOIUrl":"10.1016/S1742-6847(06)70412-8","url":null,"abstract":"<div><p>Veteran show-goer Angus McIlwraith was pleasantly surprised by the product maturity evident at the recent Infosecurity exhibition in London.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Page 38"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70412-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73949464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-05-01DOI: 10.1016/S1742-6847(06)70410-4
Cath Everett
{"title":"Webroot spies enterprise growth","authors":"Cath Everett","doi":"10.1016/S1742-6847(06)70410-4","DOIUrl":"10.1016/S1742-6847(06)70410-4","url":null,"abstract":"<div><p>Webroot is currently the leading pure play anti-spyware vendor, but its desire to remain independent may make it vulnerable as the market consolidates.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Pages 32-34"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70410-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81576028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-05-01DOI: 10.1016/S1742-6847(06)70407-4
Cath Everett
{"title":"Smart cards face long wait","authors":"Cath Everett","doi":"10.1016/S1742-6847(06)70407-4","DOIUrl":"10.1016/S1742-6847(06)70407-4","url":null,"abstract":"<div><p>Smart cards may be in your cellphone and bank card but relative few organizations are using them as they should – to authenticate identity.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Pages 22-23"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70407-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87583757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-05-01DOI: 10.1016/S1742-6847(06)70404-9
SA Mathieson
{"title":"The Big Con","authors":"SA Mathieson","doi":"10.1016/S1742-6847(06)70404-9","DOIUrl":"10.1016/S1742-6847(06)70404-9","url":null,"abstract":"<div><p>Hackers and penetration testers use our social habits and expectations to infiltrate our firms and our lives. A better understanding of the risks will encourage the required changes.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Pages 12-14"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70404-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79372108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}