Illena Armstrong

Recent articles by Illena Armstrong

Medical ID fraud booming

Medical ID fraud booming

Executives need wake up call.
Illena Armstrong May 4 2012 8:00AM Security
Healthcare pros flag security concerns

Healthcare pros flag security concerns

Experts warn risks aren't just "dumb mistakes".
Illena Armstrong May 4 2012 7:40AM Security
A flight or fight response?

A flight or fight response?

Comment: Transparency after a breach does more than save face.
Illena Armstrong Sep 5 2011 2:05PM Security
Changes to information security regulation in US health industry

Changes to information security regulation in US health industry

With California's data breach notification law now being extended to cover health care organisations, businesses in this space must pay closer attention to how the personal health information entrusted to their care is safeguarded.
Illena Armstrong Mar 19 2008 1:45PM Security
Pump-and-dump scam spikes spam by 445 percent

Pump-and-dump scam spikes spam by 445 percent

Spammers, hoping to score thousands of dollars after ditching the stock they've flimflammed targets into purchasing, are inundating email boxes with one of the largest pump-and-dump scams in history.
Illena Armstrong Aug 14 2007 1:40PM Security
Anti-Malware special takes different approach

Anti-Malware special takes different approach

Illena Armstrong May 11 2007 11:31AM Security
Getting the gold

Getting the gold

Illena Armstrong May 1 2007 11:32AM Security
Paying it forward

Paying it forward

Illena Armstrong Apr 18 2007 11:33AM Security
Making the right moves for advancement

Making the right moves for advancement

In one of our features this month, "2006: Year of exposed IDs," we discuss the various breaches that have plagued businesses of all sizes over the last year. As our edition went to press, still other incidents cropped up.
Illena Armstrong Oct 17 2006 8:54PM Security
CISOs are only part of the plan

CISOs are only part of the plan

Can CISOs and CSOs make a difference in the companies for which they work? Can they shape a successful IT security program that promotes a flourishing, trusted and respected business? And, in the end, does it really matter if a company has a lead professional in place to oversee and usher in IT security practices, or can a company do without yet still maintain a strong IT security posture that begets consumer and investor confidence?
Illena Armstrong Aug 7 2006 9:53PM Security
Preventing multiple PII disorder

Preventing multiple PII disorder

I used to think I was the one and only Illena Armstrong. The sobering truth, though, is that there are likely quite a few more of me around nowadays — or, at least, there very well could be soon enough.
Illena Armstrong Jul 7 2006 9:45PM Security
The race to reduce insider threats

The race to reduce insider threats

As part of the recent Infosecurity Europe 2006 Conference in London, a Hackers’ Panel included the likes of Gary McKinnon — also known as Solo, who could be extradited from the U.K. to the U.S. for allegedly hacking into various military and NASA systems. A less covered session, however, hit upon a problem that has existed for ages but that seems to still get short shrift in enterprises today: insider threats.
Illena Armstrong Jun 5 2006 10:45PM Security
Cashing in on misconfigured systems

Cashing in on misconfigured systems

It’s not news anymore that cyberattackers penetrating corporate networks are after money, not infamy, these days. The bread they can make from these and other online activities, such as spam, is staggering. One only has to look at the recent case of Christopher William Smith, who allegedly made over $20 million illegally selling prescription drugs through spam emails.
Illena Armstrong May 10 2006 8:10PM Security
A new kid on the training block

A new kid on the training block

So what proof is there that IT security professionals are truly armed with the know-how they may promote?
Illena Armstrong Apr 14 2006 8:14PM Security
Avoiding the proverbial straw house

Avoiding the proverbial straw house

Amature security model is like a soundly built house. A security pro at a large information management provider noted that such a model will help companies to establish more proactive security profiles that rely little on reactive, tactical approaches to security, like patch management. He briefly explained the concept at the recent Cyber Security Summit in Florida.
Illena Armstrong Mar 7 2006 7:53PM Security
CSO of the year: Thomas Dunbar, global chief security officer, XL Capital

CSO of the year: Thomas Dunbar, global chief security officer, XL Capital

As the global chief security officer at a leading multinational insurance company, Thomas Dunbar has a lot of data to protect, a range of regulations with which to comply and a huge number of employees whose access to corporate IT assets he must manage.
Illena Armstrong Mar 6 2006 8:55PM Security
A view from the top

A view from the top

Compliance issues and identity theft incidents may have dominated 2005, but other problems will unfold over coming months.
Illena Armstrong Mar 6 2006 8:09PM Security
Standing strong: Partnering for a robust IT backbone

Standing strong: Partnering for a robust IT backbone

Former Secretary of the Department of Homeland Security (DHS) Tom Ridge says that no matter if discussions are about cyberterrorist attacks launched at federal agencies or cash-driven assaults targeted at large enterprises, cooperation and collaboration of federal and corporate efforts is crucial to protecting the nation’s IT backbone.
Illena Armstrong Feb 8 2006 9:26PM Security
RSA Conference: Staying up to the challenge

RSA Conference: Staying up to the challenge

The RSA Conference will celebrate its 15th anniversary this year. How has it evolved to keep up with the times?
Illena Armstrong Feb 8 2006 8:00PM Security
IT security pros get well-deserved credit

IT security pros get well-deserved credit

Harrison Ford rocked as the brainy, swashbuckling Indiana Jones. His swaggering Han Solo will be remembered for years to come. But it seems these unforgettable roles have been hard to duplicate.
Illena Armstrong Feb 7 2006 9:05PM Security

Log In

  |  Forgot your password?