Issue OverviewInformation Security magazine - February 2013/ Volume 15 / No. 1
Chinese IT equipment is often cost-effective, but the U.S. government believes Chinese vendors are a threat to American interests. This month, Information Security Magazine examines the Huawei security risks and offers points to consider before purchasing hardware from China. Elsewhere in this issue, we reveal the results of our 2013 Security Priority Survey. Over 1,800 security pros participated and the results show that mobile security dominates the worry list. We’re also looking at balancing BYOD risks and rewards where Infosec pros share their strategies for employee-owned mobile device security. Access >>>
Premium Content for Free.
The Huawei security risk: Factors to consider before buying Chinese IT
by Joel Snyder, Contributor
Cover story: The U.S. government says Chinese IT giants Huawei and ZTE pose too much risk. But do they? Joel Snyder offers his take.
BYOD security strategies: Balancing BYOD risks and rewards
by Lisa Phifer, Contributor
Allowing employee-owned mobile devices doesn’t have to mean accepting all BYOD risks. Infosec pros share their BYOD security strategies.
- The Huawei security risk: Factors to consider before buying Chinese IT by Joel Snyder, Contributor
IT Security Trends 2013: Mobile security concerns tops the list
by Robert Richardson
- IT Security Trends 2013: Mobile security concerns tops the list by Robert Richardson
Offensive security involves proactive deception tactics
by Robert Westervelt
Going on the offense doesn’t mean actively targeting cybercriminals, experts say. Deceptive tactics, phony documents can help trip up attackers.
- Offensive security involves proactive deception tactics by Robert Westervelt
2013 Security Priority Survey, security risks when buying IT hardware from China
by Robert Richardson, Editorial Director
Information Security Magazine reveals the results of its 2013 Security Priority Survey and examines the security risks associated with purchasing IT hardware from China. Elsewhere in the issue, infosec pros share their strategies for BYOD security.
Information assurance training programs create new cadre of IT security pros
by Doug Jacobson and Julie A. Rursch
University information assurance programs are varied, but they are beginning to provide technology disciplines a level of security knowledge.
Testing, assessment methods offer third-party software security assurance
by Gary McGraw, Contributor
No ultimate test can give third-party software a clean bill of health, but careful assessment can help organizations gain more control over vendors.
- 2013 Security Priority Survey, security risks when buying IT hardware from China by Robert Richardson, Editorial Director
More Premium Content Accessible For Free
Devising a security strategy for the modern network
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...
The big data challenge: What's in store for NoSQL security
In the rush to capitalize on big data, many companies forget that developing an ecosystem of structured and unstructured data means higher risk of ...
A comprehensive guide to securing the Internet of Things
As the number of Internet-connected devices grows, the potential security challenges of the so-called "Internet of Things," or IoT, can no longer be ...