Print Issue: December 03, 2012
These tools define and manage the security infrastructure by managing risk and implementing policy.
Now we get to the meat of the issue: Protecting the data directly.
From stealthy to blatant tactics, 2012 has seen them all.
We all know what we spend internally, but how do we get reliable, timely information for comparison purposes?
The latest news involving personnel and companies in the security industry, including Barracuda Networks’ new CEO, and Incapsula’s new alliance program.
As the threat landscape continues to evolve, one malicious tactic has stood the test of time: distributed denial-of-service attacks (DDoS).
The convergence of communications, VoIP and multimedia systems (video conferencing, webinars, peer-to-peer) has increased the demand for engineers capable of designing and managing systems.
A Q&A with Brian Calkin assistant director, Multi-State ISAC Security Operations Center at the Center for Internet Security.
A group of prominent security professionals forecast the most significant industry shifts in 2013. Greg Masters compiles the responses.
Valerie Aurora and Mary Gardiner have united to form a decade-long collaboration on a variety of “women in open source” advocacy projects, including developing anti-harassment policies at conferences.
Next post in Reboot 2012