Print Issue: February 01, 2012
As cloud computing evolves, security strategies must address load, perimeter and behind-the-firewall protection, as well as availability.
When people ask him what he does, Rick JR Mayberry tells them he helps Fortune X companies develop their network security roadmap.
Data protection laws can be more effective if simpler, says JAS Global Advisors’ Jeff Schmidt.
Criminals are finding social media websites like Facebook, which contain a vast array of personal assets, to be a treasure trove of information that they can use to launch further attacks.
Turf wars remain a major roadblock to embracing the merger of physical and logical security. But Honolulu CIO Gordon Bruce believes the right time for such a project is now.
Organizations are working overtime to design ways to control, via policy and technology, employees’ penchant for sharing private information across social networking and mobile devices.
The FTC settled a case with Upromise after it failed to encrypt information and provide details about its data collection practices.
An enhanced volume of sharing is allowing critical infrastructure operators and government agencies to better defend themselves from attacks, says Mark Clancy, The Depository Trust & Clearing Corp.
Debate: M&A activity in the cyber security arena will significantly increase in 2012.
While many mobile applications do what they’re supposed to, countless others carry malware.
Next post in 2006 Awards