Print Issue: August 01, 2012
Many of today’s applications are designed to work over any port, which increases chances they won’t be blocked by firewalls.
Walter Strycharz Jr., a senior IS auditor at the University System of Maryland, discusses some of the concerns, challenges and achievements he has experienced.
Only through collaboration can government and the private sector thwart cyber attacks, says Raymond Choo.
Businesses may no longer be able to turn away employees who want to bring their smartphones and tablets to work, and connect to the corporate network. But is that actually a good thing?
Security metrics remain elusive for many organizations, but key performance indicators, or KPIs, are achievable measurements that can help guide business planning and strategy.
Many view information sharing as an elusive quest, hampered by various roadblocks. But Georgia Tech researchers want to tear down these hurdles with a new threat intelligence system known as Titan.
Yahoo presumably took no measures to ensure sensitive stuff like customer account credentials were kept safe and sound.
Consensus needs to be developed around how critical infrastructure is defined, says Mark Clancy, managing director and CISO for The Depository Trust & Clearing Corp.
Authenticating to a SaaS application in the cloud should be simple. It now Is.
Security veteran Howard Schmidt filled a spot few others reportedly wanted: the role of U.S. cyber security coordinator. Two-and-a-half years later, he’s leaving the job, feeling accomplished.
Next post in Security News