SC Media >
March 01, 2011
Enterprise security teams need to get involved early in the decision-making process in cloud initiatives.
Dust off your company’s risk assessment process and make sure it is up to date because this is where your approach to defending against a WikiLeaks type of threat is going to start.
Ravenous merger-and-acquisition activity is telling of a desire by organizations to consolidate their security and operational tasks, especially as threats increase.
Name a device and, chances are, it soon will have the capability to connect to the internet, if it does not already. Yet, with this web enablement comes a slew of risks for the enterprise.
SC Magazine has recognized Scott Sysol of CUNA Mutual Group as CSO of the Year for his work around data privacy, risk reduction, enterprise-wide IT controls and tapeless backup.
This month, we get a chance to take a peek into the future, as well as viewing the current state of information assurance (IA) practice.
Every consulting firm that we are working with is requesting pros with identity and access management skills, says Joyce Brocaglia, CEO of Alta Associates.
Development teams often ignore application security requirements in order to meet all their hard-pressed deadlines and requirements, says Fares Alraie software security specialist at the Royal Bank of Canada.
A roundup of company hires, partnerships and acquisitions in February.
Privacy advocates appear to be on the losing end of an initiative from the Department of Justice mandating the retention of user data by internet service providers (ISPs).
Next post in Features