Security Architecture, Application security, Endpoint/Device Security, Endpoint/Device Security, Security Strategy, Plan, Budget, Vulnerability Management, Patch/Configuration Management, Governance, Risk and Compliance, Compliance Management, Endpoint/Device Security, Endpoint/Device Security, Endpoint/Device Security

Editorial: Catching that end-of-year moment of silence

Hurtling into our annual Reboot edition, I became conscious of the break-neck speed at which 2007 has come to its end.

This industry's fast pace keeps us all on our toes, no doubt. But, in our execution of the many visions and associated projects we all establish for ourselves and companies, we rarely get tranquil moments to really reflect on what we've achieved, how far we've come and what that means to our futures.

This issue's goal, then, is to allow us a bit of time to quietly ponder the industry in which we all are driven to work so hard. Who are some of the lead thinkers in our market who should be acknowledged for their contributions? What were some of the more scary attacks we saw this year and how will these translate to next year? Which acquisitions may further modify the market's landscape? And just what were the creators of Live Free or Die Hard thinking?

In addition to answering some of these questions, we also have begun a new tradition with this issue. To complement our year-end features, for the first time in our Product Section we've included a Look Ahead at some of the more forward-thinking offerings that executives might want to test for themselves during the next year. A modified Group Test — accounting for such attributes as shelf life, innovation, usefulness and comprehensiveness — this review highlights the pioneering IT security solutions that company executives may want to consider looking at to more holistically safeguard their growing networks. Those vendors included receive our new SC Magazine Innovator recognition. And, in an online exclusive, we continue to offer up our Best of 2007 review.

Indeed, in gathering up loads of information for our 2008 finale, we decided to include a number of extra lists and information on our web site. For example, HD Moore, director of security research at BreakingPoint Systems, made it to our list of “Top 7 security researchers” for publishing exploit code for a vulnerability in Apple's iPhone. In another find on the web site, we asked one of the experts participating on our 2008 SC Magazine Awards judging panel, Michael Hamilton, CISO, City of Seattle, to provide us with his “CISO wish list” for next year.

A lot has transpired over the last 12 months. A little moment of silence to look ahead at what might be in store for next year is just the ticket. Too bad a ringing iPhone had to break this thoughtful stillness.
Merry holidays and happy new year to you and yours!

Illena Armstrong is SC Magazine's U.S. editor-in-chief.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.