Print Issue: March 01, 2013
Don’t presume the vShield will protect you. That actually is not the case, says Peter Stephenson.
How unified is “unified”? Judging by this year’s crop of unified threat managers under review, pretty doggone unified, says Peter Stephenson.
The UTM started out as an evolution from multipurpose devices some years back, but has now morphed into a well-defined product that has morphed again into a catch-all for security functionality.
Security incidents at the U.S. Department of Health and Human Services and Zaxby’s Franchising, and more.
The latest acquisitions and personnel moves from the likes of CipherCloud, Yahoo, Marble Cloud, Twitter, and more.
Adam Weissman, director of legal technology at The Glenmont Group, says a significant expansion of IT infrastructures has increased demand for experienced penetration testers.
IT trends – cloud, social networking and BYOD – are making the practice of security management complex, and are forcing organizations to shift to a risk-management perspective.
Dominic Vogel, IT security analyst at a financial institution in British Columbia, Canada, shares how he entered the information security field and the challenges he faces.
Prior to a job switch, ask questions to learn if the company you are considering is in good shape, says former Yahoo CISO Justin Somaini.
Industrial control systems remain troublingly vulnerable to both internal error and outside intruders, reports Danielle Walker.
Next post in Features