Print Issue: December 01, 2011
If there is anything that characterizes today’s computing environment – beyond virtualization and the techniques that has fostered – it is the pervasiveness of mobile devices.
Guesses for what a new year will bring often are wrong, but that doesn’t mean we can’t try, right? A group of some of our most trusted sources break out the DeLorean and set it to “2012.”
The infrastructure is everything about the enterprise that supports the applications and, therefore, protecting the data means protecting the infrastructure.
This year-end special section focuses on people who represent the highest degree of professionalism in security, individuals who stand out for their technical skills, managerial prowess, insight and advocacy.
Each year, we look at the burgeoning field of digital forensics and try to figure out which companies are doing the heavy lifting in terms of innovation.
It’s not all fun and games at Brady Distribution Co., a supplier of arcade entertainment, especially when malware and DDoS attacks are involved. Learn how the organization fought against the threat.
We would be hard-pressed to find many product categories in the security space that did not have some encryption component associated with them.
At no time in our history have we seen individuals and organizations so dependent on IT.
As long as we want to allow some users access and deny others, these products will be with us.
As we look at the reasons why security fails in organizations, it keeps coming back to people, says Justin Somaini, CISO, Yahoo!
Next post in Security News