Print Issue: February 01, 2011
ActivIdentity 4TRESS Authentication Appliance for Banking v 7.0
What does the $4 billion network security industry do when a new attack is exposed? It plays “the great malware cover-up.”
Consumers have adopted personalized applications of all varieties, yet the way things stand, they must be prepared to sacrifice something at least as valuable: their privacy.
Mobile threats will soon be used to gain access to personal and business devices, says Sean Martin.
Still facing budgetary pressures, security execs must apply unique thinking to security spend, which might mean studying metrics, making friends and passing compliance on the cheap.
The $1 trillion cybercrime industry is expertly – and competitively – run. Take a peek into the inner workings of these syndicates and how the good guys are closing in.
Thanks to WikiLeaks and a struggling economy, the internal threat has risen to a new level of prominence. Dawn Cappelli of Carnegie Mellon describes the profile of the rogue insider.
No matter your view of Julian Assange, his WikiLeaks controversy is the story that just keeps on giving, says Illena Armstrong, editor-in-chief, SC Magazine.
The idea of managing intrusions is a complicated one that it would be good to simplify if we can.
The security chief of Zynga offers tips for deterring today’s sophisticated attacks. They include understanding attack vectors, quantifying risk, controlling damage and being a trusted leader.
Next post in Features