nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A breach a day will keep the patients away
|
Everett, Cath |
|
2009 |
|
3 |
p. 24-27 4 p. |
artikel |
2 |
A Day in the Life of a CISO
|
Bradbury, Danny |
|
2011 |
|
3 |
p. 24-27 4 p. |
artikel |
3 |
A little less conversation, a little more security please
|
Knight, William |
|
2008 |
|
3 |
p. 36-39 4 p. |
artikel |
4 |
All Eyes on CSI: Cyberspace
|
Moraski, Lauren |
|
2011 |
|
3 |
p. 32-35 4 p. |
artikel |
5 |
An Angel on your shoulder
|
Moyle, Steve |
|
2007 |
|
3 |
p. 36-37 2 p. |
artikel |
6 |
Another line of support
|
Whitlock, Paul |
|
2009 |
|
3 |
p. 10- 1 p. |
artikel |
7 |
Anti-phishing organisation launches common reporting standard
|
Bradbury, Danny |
|
2009 |
|
3 |
p. 6-7 2 p. |
artikel |
8 |
A political trade-off
|
Grossman, Wendy |
|
2009 |
|
3 |
p. 28-31 4 p. |
artikel |
9 |
Artificial reality
|
Gold, Steve |
|
2009 |
|
3 |
p. 38-41 4 p. |
artikel |
10 |
Banks need to show some common sense
|
|
|
2007 |
|
3 |
p. 47- 1 p. |
artikel |
11 |
Baronscourt Technology
|
|
|
2007 |
|
3 |
p. 44- 1 p. |
artikel |
12 |
BBC creates a botnet of 22 000 PCs in investigation
|
Gold, Steve |
|
2009 |
|
3 |
p. 11- 1 p. |
artikel |
13 |
Bruce Schneier
|
Amorosi, Drew |
|
2011 |
|
3 |
p. 10-12 3 p. |
artikel |
14 |
Business continuity and availability planning
|
Bennett, John |
|
2007 |
|
3 |
p. 38- 1 p. |
artikel |
15 |
Can building ID management and security into the business infrastructure propel business success?
|
Powley, Des |
|
2007 |
|
3 |
p. 39- 1 p. |
artikel |
16 |
CanSecWest: lasers and electronic sniffing take over from Van Eck
|
Gold, Steve |
|
2009 |
|
3 |
p. 8-9 2 p. |
artikel |
17 |
CheckPoint
|
|
|
2007 |
|
3 |
p. 44- 1 p. |
artikel |
18 |
Costly hammer cracks tiny nut
|
Grant, Ian |
|
2007 |
|
3 |
p. 6-7 2 p. |
artikel |
19 |
Cover your back security: always one step behind
|
Dallaway, Eleanor |
|
2007 |
|
3 |
p. 8-9 2 p. |
artikel |
20 |
Cyber-Ark
|
|
|
2007 |
|
3 |
p. 44- 1 p. |
artikel |
21 |
Cyberdefence moves to the top of the Council of Europe/NATO agenda
|
Gold, Steve |
|
2008 |
|
3 |
p. 6- 1 p. |
artikel |
22 |
Data Breach Spring
|
Amorosi, Drew |
|
2011 |
|
3 |
p. 6-9 4 p. |
artikel |
23 |
Defending your organization against the new generation of Web-based hybrid
|
Ben-Itzhak, Yuval |
|
2007 |
|
3 |
p. 42-43 2 p. |
artikel |
24 |
Diary
|
|
|
2011 |
|
3 |
p. 47- 1 p. |
artikel |
25 |
DigitalPersona
|
|
|
2007 |
|
3 |
p. 44- 1 p. |
artikel |
26 |
Discover Hackistan and, er, live…
|
|
|
2007 |
|
3 |
p. 47- 1 p. |
artikel |
27 |
Does it Matter if It's Black or White?
|
Townsend, Kevin |
|
2011 |
|
3 |
p. 36-39 4 p. |
artikel |
28 |
Encryption is the new postman
|
Dallaway, Eleanor |
|
2007 |
|
3 |
p. 8- 1 p. |
artikel |
29 |
Essential Reading, But Direction Needed
|
Samani, Raj |
|
2011 |
|
3 |
p. 46- 1 p. |
artikel |
30 |
FaceTime first with Skype encrypted IM scanning technology
|
Gold, Steve |
|
2008 |
|
3 |
p. 6- 1 p. |
artikel |
31 |
Fighting over keeping hackers in check
|
Knight, William |
|
2007 |
|
3 |
p. 22-25 4 p. |
artikel |
32 |
Finjan
|
|
|
2007 |
|
3 |
p. 44- 1 p. |
artikel |
33 |
Flattery will get you everywhere
|
Mathieson, S.A. |
|
2009 |
|
3 |
p. 18-22 5 p. |
artikel |
34 |
From systems to service integration
|
Stewart, John |
|
2008 |
|
3 |
p. 14- 1 p. |
artikel |
35 |
Get more for less
|
Schenkel, Ian |
|
2009 |
|
3 |
p. 46- 1 p. |
artikel |
36 |
Gil Shwed
|
Dallaway, Eleanor |
|
2011 |
|
3 |
p. 40-43 4 p. |
artikel |
37 |
Guru, not rock star
|
Penri-Williams, Hugh |
|
2009 |
|
3 |
p. 43- 1 p. |
artikel |
38 |
Holistically-thinking
|
Mattsson, Ulf |
|
2009 |
|
3 |
p. 10- 1 p. |
artikel |
39 |
Home Office rejects request for £1.3m e-crime unit
|
Grant, Ian |
|
2008 |
|
3 |
p. 8- 1 p. |
artikel |
40 |
IEDs Take on a New Meaning
|
Colley, John |
|
2011 |
|
3 |
p. 45- 1 p. |
artikel |
41 |
In brief
|
|
|
2009 |
|
3 |
p. 6- 1 p. |
artikel |
42 |
In brief
|
|
|
2007 |
|
3 |
p. 7- 1 p. |
artikel |
43 |
In brief
|
|
|
2008 |
|
3 |
p. 8- 1 p. |
artikel |
44 |
Increased collaboration between companies set to ignite new security market
|
McKenna, Brian |
|
2007 |
|
3 |
p. 9- 1 p. |
artikel |
45 |
Information security goes green
|
Arnfield, Robin |
|
2009 |
|
3 |
p. 32-34 3 p. |
artikel |
46 |
Internet Explorer, Firefox and Safari hacked within hours
|
Gold, Steve |
|
2009 |
|
3 |
p. 8- 1 p. |
artikel |
47 |
Interview: Adrienne Hall
|
Dallaway, Eleanor |
|
2008 |
|
3 |
p. 12-13 2 p. |
artikel |
48 |
ITV.com plants pop-up scareware
|
|
|
2008 |
|
3 |
p. 48- 1 p. |
artikel |
49 |
Japanese teenager steals $325 000 to buy a dress
|
|
|
2008 |
|
3 |
p. 48- 1 p. |
artikel |
50 |
Jezza Clarkson's ‘steal my ID’ stunt goes wrong
|
|
|
2008 |
|
3 |
p. 48- 1 p. |
artikel |
51 |
Kids responsible for Estonia attack
|
Grant, Ian |
|
2009 |
|
3 |
p. 11- 1 p. |
artikel |
52 |
Legislation at war
|
Mathieson, SA |
|
2007 |
|
3 |
p. 26-28 3 p. |
artikel |
53 |
Life After Breach
|
Pritchard, Stephen |
|
2011 |
|
3 |
p. 28-31 4 p. |
artikel |
54 |
Lloyds TSB accused of Trojan vagueness
|
|
|
2008 |
|
3 |
p. 48- 1 p. |
artikel |
55 |
Marshal
|
|
|
2007 |
|
3 |
p. 44- 1 p. |
artikel |
56 |
McKinnon attracts support of Terry Waite and Sting
|
Stringer, Rob |
|
2009 |
|
3 |
p. 11- 1 p. |
artikel |
57 |
Microsoft
|
|
|
2007 |
|
3 |
p. 46- 1 p. |
artikel |
58 |
Music piracy born out of a ‘something for nothing’ society
|
Dallaway, Eleanor |
|
2008 |
|
3 |
p. 16-20 5 p. |
artikel |
59 |
MXI
|
|
|
2007 |
|
3 |
p. 46- 1 p. |
artikel |
60 |
NAC: simple as ABC
|
Bradshaw, Andrew |
|
2008 |
|
3 |
p. 14- 1 p. |
artikel |
61 |
No teeth
|
Clark, Gary |
|
2009 |
|
3 |
p. 10- 1 p. |
artikel |
62 |
One quarter of British databases ‘almost certainly’ illegal
|
Stringer, Rob |
|
2009 |
|
3 |
p. 7- 1 p. |
artikel |
63 |
Online check-in easy to hack
|
Munro, Ken |
|
2008 |
|
3 |
p. 41- 1 p. |
artikel |
64 |
Online top 20: data captured using kaspersky lab'S online scanner
|
|
|
2007 |
|
3 |
p. 10- 1 p. |
artikel |
65 |
Password problems
|
Craymer, Jonathan |
|
2008 |
|
3 |
p. 14- 1 p. |
artikel |
66 |
Peer pressure
|
Long, Johnny |
|
2008 |
|
3 |
p. 42-43 2 p. |
artikel |
67 |
Pirate Bay develops anonymous VPN user protection
|
Gold, Steve |
|
2009 |
|
3 |
p. 8- 1 p. |
artikel |
68 |
Pirates of the digital age
|
Sears, Nick |
|
2009 |
|
3 |
p. 42- 1 p. |
artikel |
69 |
Pointsec
|
|
|
2007 |
|
3 |
p. 46- 1 p. |
artikel |
70 |
Police continent
|
Grant, Ian |
|
2007 |
|
3 |
p. 7-8 2 p. |
artikel |
71 |
Product Roundup
|
|
|
2008 |
|
3 |
p. 44-46 3 p. |
artikel |
72 |
Putting faith in the underdog
|
Pritchard, Stephen |
|
2008 |
|
3 |
p. 22-23 2 p. |
artikel |
73 |
Rear view mirror
|
Grant, Ian |
|
2007 |
|
3 |
p. 18-21 4 p. |
artikel |
74 |
Room for growth in an over-crowded space?
|
Everett, Cath |
|
2007 |
|
3 |
p. 29-31 3 p. |
artikel |
75 |
Say hello to a new cybercrime business model: CAAS
|
Gold, Steve |
|
2008 |
|
3 |
p. 10- 1 p. |
artikel |
76 |
Secunia: More work needed on patching
|
Bradbury, Danny |
|
2009 |
|
3 |
p. 6- 1 p. |
artikel |
77 |
Secure at a distance
|
Everett, Cath |
|
2007 |
|
3 |
p. 16-17 2 p. |
artikel |
78 |
Security professionals need to improve people (and business) management skills before IT skills
|
Colley, John |
|
2007 |
|
3 |
p. 40-41 2 p. |
artikel |
79 |
Seven Crucial Infosec Career Steps
|
|
|
2011 |
|
3 |
p. 20-23 4 p. |
artikel |
80 |
Slack space
|
|
|
2009 |
|
3 |
p. 48- 1 p. |
artikel |
81 |
Slack Space
|
|
|
2011 |
|
3 |
p. 48- 1 p. |
artikel |
82 |
Somebody's watching me
|
Dallaway, Eleanor |
|
2008 |
|
3 |
p. 5- 1 p. |
artikel |
83 |
Sophos
|
|
|
2007 |
|
3 |
p. 46- 1 p. |
artikel |
84 |
S.P.I. Dynamics
|
|
|
2007 |
|
3 |
p. 46- 1 p. |
artikel |
85 |
Staying green
|
Smith, Greg |
|
2009 |
|
3 |
p. 10- 1 p. |
artikel |
86 |
Street life
|
Dallaway, Eleanor |
|
2009 |
|
3 |
p. 5- 1 p. |
artikel |
87 |
Symantec admits card data probably leaked from India
|
Gold, Steve |
|
2009 |
|
3 |
p. 9- 1 p. |
artikel |
88 |
Talkin' Bout a Revolution
|
Dallaway, Eleanor |
|
2011 |
|
3 |
p. 5- 1 p. |
artikel |
89 |
TelTech intros pay-as-you-use lie detector phone service
|
Gold, Steve |
|
2009 |
|
3 |
p. 9- 1 p. |
artikel |
90 |
The CISO Pilgrimage
|
Grossman, Wendy M. |
|
2011 |
|
3 |
p. 16-19 4 p. |
artikel |
91 |
The DNA of infosecurity
|
McKenna, Brian |
|
2007 |
|
3 |
p. 5- 1 p. |
artikel |
92 |
The evolution of attack
|
Jones, Andy |
|
2008 |
|
3 |
p. 30-31 2 p. |
artikel |
93 |
Tightening the purse strings
|
Pritchard, Stephen |
|
2009 |
|
3 |
p. 12-17 6 p. |
artikel |
94 |
Tightening the purse strings on security
|
Condon, Ron |
|
2007 |
|
3 |
p. 12- 1 p. |
artikel |
95 |
Time to step up
|
Halbheer, Roger |
|
2009 |
|
3 |
p. 45- 1 p. |
artikel |
96 |
Top brands targeted by phishing SCAMS: Source: Mcafee
|
|
|
2007 |
|
3 |
p. 10- 1 p. |
artikel |
97 |
Tumbleweed
|
|
|
2007 |
|
3 |
p. 46- 1 p. |
artikel |
98 |
Two US companies own up to breaches
|
Sterlicchi, John |
|
2008 |
|
3 |
p. 10- 1 p. |
artikel |
99 |
UK government launches enquiry into card fraud
|
Gold, Steve |
|
2008 |
|
3 |
p. 8- 1 p. |
artikel |
100 |
VoIP - soon to be under attack?
|
Mathieson, SA |
|
2007 |
|
3 |
p. 9- 1 p. |
artikel |
101 |
Watch this congested space
|
Grossman, Wendy |
|
2008 |
|
3 |
p. 26-28 3 p. |
artikel |
102 |
What will it take to get the crypto message across?
|
Finlay, Geoffrey |
|
2008 |
|
3 |
p. 14- 1 p. |
artikel |
103 |
White hats fight back
|
Bradbury, Danny |
|
2008 |
|
3 |
p. 32-34 3 p. |
artikel |
104 |
Whoops - Scotland Yard's career site gets hacked
|
|
|
2008 |
|
3 |
p. 48- 1 p. |
artikel |
105 |
Windows 'Vista in a Nutshell' rush-released
|
|
|
2007 |
|
3 |
p. 47- 1 p. |
artikel |
106 |
ZigBee: A long way to go?
|
Mišic, Jelena |
|
2007 |
|
3 |
p. 32-35 4 p. |
artikel |