Budgets

IT security: Luxury or commodity in these uncertain times?

IT security: Luxury or commodity in these uncertain times?

Security professionals must toe the delicate line of assessing and responding to legitimate risk and being mindful of an organization's needs. Working in their favor is belief that protecting sensitive data is a fundamental component of any business operation.

Attention executives: Make sense of security (finally)

Attention executives: Make sense of security (finally)

Boardrooms are finally buzzing with serious discussion around cyber security as countless high-profile breaches have produced massive loss.

Tightening the fed's belt: Government Roundtable

Tightening the fed's belt: Government Roundtable By

At a recent SC Magazine Roundtable, gov't security pros bemoaned the difficulty in obtaining resources. But instead of crying over spilled milk, they traded ideas for mitigating risk in a down economy.

Evolutionary conundrums...

Evolutionary conundrums... By

There are a whole host of things driving budget, resources and tweaks to security/risk management programs.

Sponsored Video: Stephen Cobb of ESET on RSA 2012 hot topics

By

Stephen Cobb, security evangelist at ESET, discusses the hot topics at this year's RSA Conference 2012, including BYOD, attacks on social networks, and resource challenges in today's economy.

Sponsored Video: Hugh Njemanze of HP on resource challenges

By

"Budgets are low, while threats are increasing," said Hugh Njemanze, CTO and VP of worldwide research and development at HP Enterprise Security, at this year's RSA Conference 2012.

Security spending to increase in 2012, survey shows

By

While the nation's economy remains in the tank, the information security market appears to be avoiding a major slowdown.

SC Congress New York: Attacks increasing, budgets lagging

By

As the threat landscape worsens, efforts by security professionals to defend networks are hampered by tight budgets, participants on a panel agreed at Wednesday's SC Congress New York.

Nine out of 10 businesses breached in the last year

By

Not surprisingly based on the recent headlines, a new survey shows that 90 percent of organizations have been hit by at least one data breach in the past year.

SC Magazine's CSO of the Year

SC Magazine's CSO of the Year By

SC Magazine has recognized Scott Sysol of CUNA Mutual Group as CSO of the Year for his work around data privacy, risk reduction, enterprise-wide IT controls and tapeless backup.

RSA Conference 2011: CISO panel expects innovation, offers advice

By

Tools that better classify data, provide deep-packet inspection and offer risk management for organizations migrating to the cloud are three solutions areas ready to make their mark in the security industry, predicted a panel of CISOs on Tuesday.

Ensuring efficiency: Budget issues

Ensuring efficiency: Budget issues By

Still facing budgetary pressures, security execs must apply unique thinking to security spend, which might mean studying metrics, making friends and passing compliance on the cheap.

Showing how security is a value-add to the organization

Showing how security is a value-add to the organization

With the economy gradually lifting out of its slumber, information security professionals must convince budget bosses that they can't operate on a shoestring spending plan for much longer.

IT security budget issues: Fiscal reality

IT security budget issues: Fiscal reality By

The financial crisis will have a lasting impact, but some organizations have found ways of doing more with less.

Spend more now, pay less later

Spend more now, pay less later

It is difficult to measure exactly what the ROI is for security, particularly when you haven't suffered any type of breach, says McAfee's Alex Thurber.

First things first: Refresh your firewall

First things first: Refresh your firewall

If CSOs only have budget to make one technology purchase, they should consider a firewall upgrade.

Study finds businesses spending too much on compliance

By

A new report from Forrester Research's consulting arm reveals that organizations are focusing too much on compliance and not nearly enough on protecting valuable proprietary information.

Advertisement

How to Prevent Insider Threats!

POLL