Illena Armstrong

Recent articles by Illena Armstrong

Medical ID fraud booming

Medical ID fraud booming

Executives need wake up call.
May 4 2012 8:00AM
Healthcare pros flag security concerns

Healthcare pros flag security concerns

Experts warn risks aren't just "dumb mistakes".
May 4 2012 7:40AM
A flight or fight response?

A flight or fight response?

Comment: Transparency after a breach does more than save face.
Sep 5 2011 2:05PM
Changes to information security regulation in US health industry

Changes to information security regulation in US health industry

With California's data breach notification law now being extended to cover health care organisations, businesses in this space must pay closer attention to how the personal health information entrusted to their care is safeguarded.
Mar 19 2008 1:45PM
Pump-and-dump scam spikes spam by 445 percent

Pump-and-dump scam spikes spam by 445 percent

Spammers, hoping to score thousands of dollars after ditching the stock they've flimflammed targets into purchasing, are inundating email boxes with one of the largest pump-and-dump scams in history.
Aug 14 2007 1:40PM
Anti-Malware special takes different approach

Anti-Malware special takes different approach

May 11 2007 11:31AM
Getting the gold

Getting the gold

May 1 2007 11:32AM
Paying it forward

Paying it forward

Apr 18 2007 11:33AM
Making the right moves for advancement

Making the right moves for advancement

In one of our features this month, "2006: Year of exposed IDs," we discuss the various breaches that have plagued businesses of all sizes over the last year. As our edition went to press, still other incidents cropped up.
Oct 17 2006 8:54PM
CISOs are only part of the plan

CISOs are only part of the plan

Can CISOs and CSOs make a difference in the companies for which they work? Can they shape a successful IT security program that promotes a flourishing, trusted and respected business? And, in the end, does it really matter if a company has a lead professional in place to oversee and usher in IT security practices, or can a company do without yet still maintain a strong IT security posture that begets consumer and investor confidence?
Aug 7 2006 9:53PM
Preventing multiple PII disorder

Preventing multiple PII disorder

I used to think I was the one and only Illena Armstrong. The sobering truth, though, is that there are likely quite a few more of me around nowadays — or, at least, there very well could be soon enough.
Jul 7 2006 9:45PM
The race to reduce insider threats

The race to reduce insider threats

As part of the recent Infosecurity Europe 2006 Conference in London, a Hackers’ Panel included the likes of Gary McKinnon — also known as Solo, who could be extradited from the U.K. to the U.S. for allegedly hacking into various military and NASA systems. A less covered session, however, hit upon a problem that has existed for ages but that seems to still get short shrift in enterprises today: insider threats.
Jun 5 2006 10:45PM
Cashing in on misconfigured systems

Cashing in on misconfigured systems

It’s not news anymore that cyberattackers penetrating corporate networks are after money, not infamy, these days. The bread they can make from these and other online activities, such as spam, is staggering. One only has to look at the recent case of Christopher William Smith, who allegedly made over $20 million illegally selling prescription drugs through spam emails.
May 10 2006 8:10PM
A new kid on the training block

A new kid on the training block

So what proof is there that IT security professionals are truly armed with the know-how they may promote?
Apr 14 2006 8:14PM
Avoiding the proverbial straw house

Avoiding the proverbial straw house

Amature security model is like a soundly built house. A security pro at a large information management provider noted that such a model will help companies to establish more proactive security profiles that rely little on reactive, tactical approaches to security, like patch management. He briefly explained the concept at the recent Cyber Security Summit in Florida.
Mar 7 2006 7:53PM
CSO of the year: Thomas Dunbar, global chief security officer, XL Capital

CSO of the year: Thomas Dunbar, global chief security officer, XL Capital

As the global chief security officer at a leading multinational insurance company, Thomas Dunbar has a lot of data to protect, a range of regulations with which to comply and a huge number of employees whose access to corporate IT assets he must manage.
Mar 6 2006 8:55PM
A view from the top

A view from the top

Compliance issues and identity theft incidents may have dominated 2005, but other problems will unfold over coming months.
Mar 6 2006 8:09PM
Standing strong: Partnering for a robust IT backbone

Standing strong: Partnering for a robust IT backbone

Former Secretary of the Department of Homeland Security (DHS) Tom Ridge says that no matter if discussions are about cyberterrorist attacks launched at federal agencies or cash-driven assaults targeted at large enterprises, cooperation and collaboration of federal and corporate efforts is crucial to protecting the nation’s IT backbone.
Feb 8 2006 9:26PM
RSA Conference: Staying up to the challenge

RSA Conference: Staying up to the challenge

The RSA Conference will celebrate its 15th anniversary this year. How has it evolved to keep up with the times?
Feb 8 2006 8:00PM
IT security pros get well-deserved credit

IT security pros get well-deserved credit

Harrison Ford rocked as the brainy, swashbuckling Indiana Jones. His swaggering Han Solo will be remembered for years to come. But it seems these unforgettable roles have been hard to duplicate.
Feb 7 2006 9:05PM

Log In

Username:
Password:
|  Forgot your password?