Issue OverviewInformation Security magazine - April 2010
This month’s cover story focuses on the security threats that mobile devices and portable storage introduce. Other articles expound on topics like fraud prevention, security planning, and code outsourcing. Read on to learn about these important subjects and more. Access >>>
Premium Content for Free.
ISP shutdown slows Zeus botnet
Security experts say the Zeus botnet was slowed with the shutdown of Troyak, an ISP serving a large chunk of the Zeus botnet
Removable storage device endpoint security and control
by Lisa Phifer, Contributor
Endpoint security and control for devices like thumb drives, SIM cards and mobile devices can no longer be ignored.
- ISP shutdown slows Zeus botnet
Economic recovery strategies for information security professionals
Security teams will continue to focus on efficiency and alignment with business as the economy recovers
Technologies to thwart online banking fraud
by Jerry Silva
Today's anti-fraud technologies create gated communities for online banking.
- Economic recovery strategies for information security professionals
Information Security Profession Takes Two Steps Backward
The information security profession took two steps backwards with the firing of Pennsylvannia's CISO because of his comments on a conference panel, which illustrates the continuing disconnect between management and information security.
Schneier-Ranum Face-Off: Should the Government Stop Outsourcing Code Development?
Is outsourcing code development a threat to national security? Marcus Ranum and Bruce Schneier go head-to-head on this topic.
Cloud computing legal issues
Lawyers have a lot of concerns about cloud computing services. Learn about cloud computing legal issues
- Information Security Profession Takes Two Steps Backward
More Premium Content Accessible For Free
Cloud and mobility in the enterprise has caused a heightened need for organizations to take a closer look at next generation authentication ...
Virtualization and cloud computing are part and parcel of enterprise networks today. Virtualization security, however, is still a bolt-on affair ...
Mobile device security is one of the biggest nightmares InfoSec pros face in the era of bring your own everything (BYOE). Simply banning employees ...