Email Alerts
-
RSA 2013: Charney optimistic about the future of information security
In his RSA Conference 2013 keynote, Microsoft's Scott Charney struck an optimistic note when talking about the future of information security. News
-
Coviello pitches 'transformational' information security strategy
In a talk critical of cyberattack finger-pointing, Art Coviello stressed the need for infosec strategy to emphasize big data, interconnectivity. News
-
2013 Security Priority Survey, security risks when buying IT hardware from China
Information Security Magazine reveals the results of its 2013 Security Priority Survey and examines the security risks associated with purchasing IT hardware from China. Elsewhere in the issue, infosec pros share their strategies for BYOD security. Editor's Letter
-
What to cut from an enterprise information security budget
Information security budgets remain largely flat, but an even bigger concern says In-Q-Tel's Peter Kuper, is what is included in those budgets. Video
-
Many in industry at odds over pending cybersecurity executive order
Some security industry veterans fear regulatory overreach, others believe an executive order won't go far enough. News
-
Emerging vulnerability markets, mobile biometrics prompt security concerns
Information Security Magazine examines key security concerns in the field of critical infrastructure protection and explores options for mobile biometric authentication because you’ll need to think about a new security strategy as mobile devices outn... Column
-
Government, industry leaders share cybersecurity funding priorities
Research projects focusing on embedded device security, system resiliency and security metrics are gaining the most attention, experts say. News
-
Eugene Kaspersky: Enterprises must make hacking difficult, costly
Companies must get better at making hacking corporate networks complicated and costly for cybercriminals, explains Kaspersky Lab CEO Eugene Kaspersky. News
-
mobile security (wireless security)
Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless ... Definition
-
Security 7 Award 2012: Seven Outstanding Information Security Pros
Security 7 Award 2012 honors seven outstanding information security pros. Find out who won this year’s Security 7 Award. Column
Security Management Strategies for the CIO