Issue Overview
Information Security magazine - February 2013/ Volume 15 / No. 1Chinese IT equipment is often cost-effective, but the U.S. government believes Chinese vendors are a threat to American interests. This month, Information Security Magazine examines the Huawei security risks and offers points to consider before purchasing hardware from China. Elsewhere in this issue, we reveal the results of our 2013 Security Priority Survey. Over 1,800 security pros participated and the results show that mobile security dominates the worry list. We’re also looking at balancing BYOD risks and rewards where Infosec pros share their strategies for employee-owned mobile device security. Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
The Huawei security risk: Factors to consider before buying Chinese IT
by Joel Snyder, Contributor
Cover story: The U.S. government says Chinese IT giants Huawei and ZTE pose too much risk. But do they? Joel Snyder offers his take.
-
BYOD security strategies: Balancing BYOD risks and rewards
by Lisa Phifer, Contributor
Allowing employee-owned mobile devices doesn’t have to mean accepting all BYOD risks. Infosec pros share their BYOD security strategies.
-
The Huawei security risk: Factors to consider before buying Chinese IT
by Joel Snyder, Contributor
-
-
IT Security Trends 2013: Mobile security concerns tops the list
by Robert Richardson
-
IT Security Trends 2013: Mobile security concerns tops the list
by Robert Richardson
-
News
-
Offensive security involves proactive deception tactics
by Robert Westervelt, News Director
Going on the offense doesn’t mean actively targeting cybercriminals, experts say. Deceptive tactics, phony documents can help trip up attackers.
-
Offensive security involves proactive deception tactics
by Robert Westervelt, News Director
-
Columns
-
2013 Security Priority Survey, security risks when buying IT hardware from China
by Robert Richardson, Editorial Director
Information Security Magazine reveals the results of its 2013 Security Priority Survey and examines the security risks associated with purchasing IT hardware from China. Elsewhere in the issue, infosec pros share their strategies for BYOD security.
-
Information assurance training programs create new cadre of IT security pros
by Doug Jacobson and Julie A. Rursch
University information assurance programs are varied, but they are beginning to provide technology disciplines a level of security knowledge.
-
Testing, assessment methods offer third-party software security assurance
by Gary McGraw, Contributor
No ultimate test can give third-party software a clean bill of health, but careful assessment can help organizations gain more control over vendors.
-
2013 Security Priority Survey, security risks when buying IT hardware from China
by Robert Richardson, Editorial Director
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO