Print Issue: September 01, 2011
Perimeter exploit exposure
Two security experts duke it out over whether organizations should invest in user awareness training.
FBI nabs PayPal hackers, report from Black Hat, announcements from Facebook and Cloud Security Alliance, plus more
Stuxnet demonstrated that even isolated physical networks could be hacked.
Suddenly, corporations can no longer ignore next-generation smartphones and tablets.
The time is ripe for open dialogue around teaching trust, says RSA Conference’s Hugh Thompson.
The perimeter is a distant memory of what it once was, considering the influx of third-party workers combined with new technologies, such as cloud and mobile. But it still needs safeguarding.
A sound approach to identification and authentication is an elementary building block to security policy within most any organization, but management of these disciplines face fresh challenges.
Today’s flurry of cybercrimes rely on an array of motivations, techniques and technologies, making the job of an investigator to track down the offender that much more difficult.
Following a major breach this year, Lockheed Martin CISO Chandra McMahon explains how a quick and calculated reaction helped stave off a disaster. What are the tricks of the trade when it comes to IR?
Next post in Features