When pondering the top information security thinkers of the year, a slew of names came to the minds of our editorial staff. In considering who ...
Signature-based solutions are not necessary to organizations' security infrastructures.
A recent news story jumped off the page at George Waller.
Former ceo of Hewlett-Packard Carly Fiorina has joined Cybertrust’s board. Fiorina said in a statement that “information security will be a key driver of growth ...
How did you get into security? I came from the physics field to begin with. I jumped in here about 11 years ago. I started as ...
Sony-BMG Entertainment has been under fire from a blogger-fueled media storm after the discovery of spyware-like technology in its CDs. Windows security expert Mark Russinovich ...
Most of the national and international TV news is taken up with the “war on terror” or the “war in Iraq.” In our area (metro ...
Perhaps the single most important thing to remember when creating a new password is to make it hard to guess, but easy to remember. That’s ...
If your days are anything like mine, there is no shortage of people who you must keep apprised of your company’s information security and risk ...
Demonstrate value: A lifecycle of IT security risk management should demonstrate that you can mitigate risk with what products you are deploying. This evidence will ...
Send your comments, praise or criticisms to scfeedbackus@haymarketmedia.com
SC Magazine’s U.S. and U.K. editorial teams spotlight some of the noteworthy people, major merger/acquisitions and leading compliance worries of yet another eventful year in ...
Richard Clarke, founder and ceo of Good Harbor Consulting, for continuing to unabashedly criticize anyone who is failing to comprehend the security requirements that go ...
At the start of the year, most of the talk centered on how IT security would be affected by new federal legislation, such as Sarbanes-Oxley ...
With Symantec, Microsoft and Cisco continuing to buy up smaller players to bolster their product portfolios, 2005 was a boon year for consolidation in the ...
When bad things happen to good networks — and no enterprise is completely immune from attacks on its IT infrastructure anymore — how the good ...
So your systems have been compromised — a distributed denial of service (DDoS) attack shut your network down or a worm infected dozens of your ...
IT security has long been the focus of corporate attention, while storage security has been — perhaps unnoticeably — absent from the limelight. So it ...
The Storage Security Industry Forum (the security forum in SNIA) recommends a five-step review for improved storage network security.
As usual, the SC Magazine readership survey has proven to be a most revealing exercise. Now in its fourth year, the end-of-year survey gives an ...
Within the next two years, most businesses will either pilot or start widescale deployments of voice over IP (VoIP). Why? To extend the capabilities of ...