no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Addressing the silo mentality
|
Dyhouse, Tony |
|
2010 |
7 |
2 |
p. 43- 1 p. |
article |
2 |
A wolf in sheep's clothing
|
Sembhi, Sarb |
|
2010 |
7 |
2 |
p. 44- 1 p. |
article |
3 |
Bad habits die hard
|
Dallaway, Eleanor |
|
2010 |
7 |
2 |
p. 5- 1 p. |
article |
4 |
Diary
|
|
|
2010 |
7 |
2 |
p. 47- 1 p. |
article |
5 |
DLP technology unplugged
|
Winder, Davey |
|
2010 |
7 |
2 |
p. 38-41 4 p. |
article |
6 |
Eugene Kaspersky
|
Dallaway, Eleanor |
|
2010 |
7 |
2 |
p. 8-9 2 p. |
article |
7 |
Financial services security changes with the times
|
Pritchard, Stephen |
|
2010 |
7 |
2 |
p. 26-28 3 p. |
article |
8 |
Healthcare IT professionals mistrustful of cloud security
|
|
|
2010 |
7 |
2 |
p. 6- 1 p. |
article |
9 |
In brief
|
|
|
2010 |
7 |
2 |
p. 6- 1 p. |
article |
10 |
Infosecurity professionals still in demand says (ISC)2 survey
|
|
|
2010 |
7 |
2 |
p. 6- 1 p. |
article |
11 |
Keeping it real: Updating your security policy in 2010
|
McKenna, Brian |
|
2010 |
7 |
2 |
p. 18-21 4 p. |
article |
12 |
Lack of precise definitions plagues cybersecurity legislation
|
|
|
2010 |
7 |
2 |
p. 11- 1 p. |
article |
13 |
Napolitano issues challenge to security community
|
|
|
2010 |
7 |
2 |
p. 12- 1 p. |
article |
14 |
National security heavyweights talk cybersecurity
|
|
|
2010 |
7 |
2 |
p. 12- 1 p. |
article |
15 |
PCI DSS survey shows encryption is tops when it comes to end-to-end security
|
|
|
2010 |
7 |
2 |
p. 10- 1 p. |
article |
16 |
Pitfalls and promise of social networking
|
|
|
2010 |
7 |
2 |
p. 10- 1 p. |
article |
17 |
Re-defining the human factor
|
Samani, Raj |
|
2010 |
7 |
2 |
p. 30-33 4 p. |
article |
18 |
Securing cloud computing is industry responsibility
|
|
|
2010 |
7 |
2 |
p. 11- 1 p. |
article |
19 |
Securing the mobile workforce
|
Cordial, Andy |
|
2010 |
7 |
2 |
p. 42- 1 p. |
article |
20 |
Security on a shoestring: How to get more for less in a recession
|
Townsend, Kevin |
|
2010 |
7 |
2 |
p. 22-25 4 p. |
article |
21 |
Serious Fraud Office warns on social networking data harvesting
|
|
|
2010 |
7 |
2 |
p. 7- 1 p. |
article |
22 |
Slack space
|
|
|
2010 |
7 |
2 |
p. 48- 1 p. |
article |
23 |
Smartphone apps need securing at software development stages
|
|
|
2010 |
7 |
2 |
p. 7- 1 p. |
article |
24 |
The battle of the internet browsers
|
Bradbury, Danny |
|
2010 |
7 |
2 |
p. 34-37 4 p. |
article |
25 |
The changing nature of the information security career
|
Colley, John |
|
2010 |
7 |
2 |
p. 14-17 4 p. |
article |