Illena Armstrong

Send feedback to Illena Armstrong

Recent articles for Illena Armstrong

Medical ID fraud booming 
May 4, 2012 | Comment Now 
Executives need wake up call.
Healthcare pros flag security concerns  
May 4, 2012 | Comment Now 
Experts warn risks aren't just "dumb mistakes".
A flight or fight response? 
Sep 5, 2011 | Comment Now 
Comment: Transparency after a breach does more than save face.
Changes to information security regulation in US health industry  
Mar 19, 2008 | Comment Now 
With California's data breach notification law now being extended to cover health care organisations, businesses in this space must pay closer attention to how the personal ...
Pump-and-dump scam spikes spam by 445 percent 
Aug 14, 2007 | Comment Now 
Spammers, hoping to score thousands of dollars after ditching the stock they've flimflammed targets into purchasing, are inundating email boxes with one of the largest ...
Anti-Malware special takes different approach 
Getting the gold 
Paying it forward 
Making the right moves for advancement 
Oct 17, 2006 | Comment Now 
In one of our features this month, "2006: Year of exposed IDs," we discuss the various breaches that have plagued businesses of all sizes over the last year. As our edition ...
CISOs are only part of the plan 
Aug 7, 2006 | Comment Now 
Can CISOs and CSOs make a difference in the companies for which they work? Can they shape a successful IT security program that promotes a flourishing, trusted and respected ...
Preventing multiple PII disorder 
Jul 7, 2006 | Comment Now 
I used to think I was the one and only Illena Armstrong. The sobering truth, though, is that there are likely quite a few more of me around nowadays — or, at least, there very ...
The race to reduce insider threats 
Jun 5, 2006 | Comment Now 
As part of the recent Infosecurity Europe 2006 Conference in London, a Hackers’ Panel included the likes of Gary McKinnon — also known as Solo, who could be extradited from the ...
Cashing in on misconfigured systems 
May 10, 2006 | Comment Now 
It’s not news anymore that cyberattackers penetrating corporate networks are after money, not infamy, these days. The bread they can make from these and other online activities,...
A new kid on the training block 
Apr 14, 2006 | Comment Now 
So what proof is there that IT security professionals are truly armed with the know-how they may promote?
Avoiding the proverbial straw house 
Mar 7, 2006 | Comment Now 
Amature security model is like a soundly built house. A security pro at a large information management provider noted that such a model will help companies to establish more ...
CSO of the year: Thomas Dunbar, global chief security officer, XL Capital 
Mar 6, 2006 | Comment Now 
As the global chief security officer at a leading multinational insurance company, Thomas Dunbar has a lot of data to protect, a range of regulations with which to comply and a ...
A view from the top 
Mar 6, 2006 | Comment Now 
Compliance issues and identity theft incidents may have dominated 2005, but other problems will unfold over coming months.
Standing strong: Partnering for a robust IT backbone 
Feb 8, 2006 | Comment Now 
Former Secretary of the Department of Homeland Security (DHS) Tom Ridge says that no matter if discussions are about cyberterrorist attacks launched at federal agencies or ...
RSA Conference: Staying up to the challenge 
Feb 8, 2006 | Comment Now 
The RSA Conference will celebrate its 15th anniversary this year. How has it evolved to keep up with the times?
IT security pros get well-deserved credit 
Feb 7, 2006 | Comment Now 
Harrison Ford rocked as the brainy, swashbuckling Indiana Jones. His swaggering Han Solo will be remembered for years to come. But it seems these unforgettable roles have been ...
Sign up to receive iTnews email bulletins
Latest Comments
Should law enforcement be able to buy and use exploits?

   |   View results
Only in special circumstances
Yes, but with more transparency