Print Issue: June 01, 2008
It takes reinforcement to drive home a security message.
Humans are oftentimes gullible and inquisitive, and spammers are taking full advantage.
A robust public/private partnership can be more firmly established.
Even if vendor security is not on the radar of your regulators or auditors, you may still want to consider how a vendor information security program could help you reach your greater aim of ensuring the confidentiality, integrity and availability of your organization’s information assets.
IT pros must think about changing their security focus, says Michelle Drolet.
Raise a glass of Champagne to honor the winners of the SC Magazine Awards 2008.
Federated identity management solutions offer the promise of single sign-on, but are slow to see adoption, Jim Carr discovers.
There are strategies to combat thieves looking to exploit people’s benevolence in providing personal info, reports Eric Butterman.
Alex Tosheff, Bill Me Later’s new CISO, says understanding and protecting data is now priority number one, reports Dan Kaplan.
Email is the grease that makes today’s business run smoothly, says Peter Stephenson.
Next post in Reviews