Print Issue: December 02, 2013
GRC is at once the biggest pain point (arguably) of most large organizations and the most important task that does not usually get done right.
We pay tribute to two security pros whose life’s work helped evolve the technology and thinking of the IT security industry.
How do we protect a perimeter that does not, physically, exist?
We salute a number of professionals – including lawyers, analysts, journalists and engineers – whose achievements in 2013 greatly enhanced the IT security industry and those affected by it.
Since it’s all about the data why not go straight to the data and protect it directly?
The revelations about government surveillance made public by Edward Snowden have brought urgency and clarity to the work Jennifer Stisa Granick is doing as director of civil liberties at the Stanford Center for Internet and Society (CIS).
Analysis and testing covers the entire gamut of testing – from forensic tools to penetration testing.
Phyllis Schneck takes a level-headed approach to how the DHS should address potential attacks against critical infrastructure.
Access control is, arguably, the key aspect of information protection.
Jay Radcliffe showed how his insulin pump was vulnerable to a remote takeover.
Next post in Features