SC Awards 2010

Changes to celebrate the industry

Changes to celebrate the industry

By

The SC Magazine Awards have been going strong for years now.

Firewall revolution or evolution?

Firewalls are again becoming talk of the town. There are an enormous amount of opinions including claims of a recent firewall revolution that have been proposed to completely change the firewall landscape. I will be the first to admit that the features and capabilities offered in today's firewall products are not the same as was offered in their original incarnation. But then again, traffic patterns and applications are not the same as they were when firewalls first hit the market.

Why intrusion prevention systems fail to protect web applications

There is overwhelming evidence in reports such as the SANS Top Cyber Security Risks and the Verizon Data Breach Investigation Report that web applications are the Achilles' heel of most networks and criminals know it. In order to protect web applications, the network security paradigm has to shift from "Keep People Out" to "What Are They Doing?" and the IT infrastructure spending needs to follow suit.

Is increased government regulation the answer to increased privacy protection?

Data breaches involving privacy information continue to increase despite the costs, embarrassment and negative publicity associated with them.

Security vision for the smarter planet

Over a year ago, IBM began a global conversation about how the planet is becoming smarter with an increasingly instrumented, interconnected and intelligent infrastructure. There is an explosive growth of data that is collected about virtually every aspect of our lives that we can connect and share across billions of devices with built-in intelligence. Our ability to use this data to visualize, control and automate what happens in our environment influences every aspect of our lives from financial transactions, to healthcare, retail, transportation, communications, government and utilities.

ITIL + IT-GRC = mass * velocity

In the world of acronyms, information technologists seem to lag behind only government agencies in their ability to create jargon and abbreviations of cryptic concepts. IT-GRC is one member of the IT lingo club. The Information Technology Infrastructure Library, or ITIL, is a fellow acronym gaining more acceptance and popularity within the IT industry. ITIL provides a common framework to formalize a service-oriented management approach within IT and improve interaction between IT and the business.

2010 SC Awards Announces New Blogger Award Categories - Nominate Today!

By

With the SC Magazine Awards Blog, we're attempting to add thought-provoking subject matter from industry leaders on a wide variety of topics and issues facing the security industry today. Hopefully, these blog posts are providing you additional value and insight into the state of the industry and a forward-looking forum on the challenges we are likely to see in the future.

Finding solutions for the problem of consumerization.

Consumerization is the use of consumer targeted technology in the work environment. While it may not yet have reached fever pitch, there is a steady and growing awareness of the risks of a new trend in business computing: consumerization.

Change is constant - so is compliance

Organizations must reconsider how they respond to compliance requirements.

Peeling the onion layer on the web security inertia

Organizations must overcome the "myths" and "inhibitors" around securing web applications.

The Achilles Heel in IT security

Deploying an effective endpoint security strategy is essential in a business environment with growing numbers of telecommuters.

Preparing for the unknown unknowns

Let's face it: Breaches are going to happen. As a result, detection and incident response may actually be more important than prevention.

Why we need hackers

The stigma attached to the term "hacker" needs to be dropped if computer security advancements are to be made.

Visibility, speed, efficiency and the new dynamics of IT security

Gaining visibility and eliminating latencies while maintaining effective systems and security management can help close off the possibility of a devastating data breach.

How remote access can bridge the gap

Whether it's a bridge closure or a catastrophic flu outbreak, remote access capabilities can help businesses stay afloat during difficult times.

Welcome to the 2010 SC Awards blog

By

Each year, SC Magazine celebrates the best and brightest leaders of the IT Security industry with the SC Awards. Award finalists have been recognized by the security community for the work they do every day in the trenches to help fight the battle for a more secure enterprise.

Sign up to our newsletters

POLL