Print Issue: February 01, 2012
When people ask him what he does, Rick JR Mayberry tells them he helps Fortune X companies develop their network security roadmap.
Data protection laws can be more effective if simpler, says JAS Global Advisors’ Jeff Schmidt.
Criminals are finding social media websites like Facebook, which contain a vast array of personal assets, to be a treasure trove of information that they can use to launch further attacks.
Turf wars remain a major roadblock to embracing the merger of physical and logical security. But Honolulu CIO Gordon Bruce believes the right time for such a project is now.
Organizations are working overtime to design ways to control, via policy and technology, employees’ penchant for sharing private information across social networking and mobile devices.
The FTC settled a case with Upromise after it failed to encrypt information and provide details about its data collection practices.
An enhanced volume of sharing is allowing critical infrastructure operators and government agencies to better defend themselves from attacks, says Mark Clancy, The Depository Trust & Clearing Corp.
Next post in 2006 Awards