Print Issue: September 01, 2011
The perimeter is a distant memory of what it once was, considering the influx of third-party workers combined with new technologies, such as cloud and mobile. But it still needs safeguarding.
A sound approach to identification and authentication is an elementary building block to security policy within most any organization, but management of these disciplines face fresh challenges.
Today’s flurry of cybercrimes rely on an array of motivations, techniques and technologies, making the job of an investigator to track down the offender that much more difficult.
Following a major breach this year, Lockheed Martin CISO Chandra McMahon explains how a quick and calculated reaction helped stave off a disaster. What are the tricks of the trade when it comes to IR?
This month we explore tools to help us wrangle our users and separate them from the herd of bad guys trying to enter our enterprise without authorization.
A Maryland real estate company streamlined its operations by moving email and other operations to the cloud, But that wasn’t the only benefit: The migration also helped the business better protect its data.
Tools designed particularly for network forensics have some important capabilities not shared by tools whose job is solely to alert on a policy violation.
Transparency after a breach does more than save face.
This month’s personnel announcements, launches and merger and acquisition activity.
Cybercriminal activity across the globe, plus a roundup of security-related news.
Next post in Features