SC Media >
Print Issue: September 04, 2012
A Q&A with Adel Danesh, manager, enterprise systems at The Hospital for Sick Children in Toronto.
Flame’s cryptofunctionality silenced all the haters, says F-Secure’s Mikko Hyppönen.
The ability to marry physical and logical security controls is maturing, which means companies can find efficiency wins, while in the process lowering their risk profile.
Applications provide the path to an organization’s coveted assets. And even if they’re not public-facing, they still can be a ripe target. We talk to Marcus Prendergast, CSO of ITG, for this month’s cover story.
When the history of the cyber arms race is written, the first chapter surely will be devoted to Stuxnet. But now that these sophisticated strikes have started, there are plenty of questions to answer.
With breaches grabbing headlines and cash funneling toward infosec budgets, the role of the security executive is shifting from tech and compliance wonk to savvy businessperson.
President Obama now is considering an executive order to breathe some life back into the Cyber Security Act of 2012 with the goal in mind to protect the country’s critical infrastructure.
Policies form the cornerstone of the information security program and are instrumental for enforcing global consistency, driving change and launching enterprise programs.
Debate: In light of recent breaches, passwords remain a useful method for authentication.
The head of the NSA, the entity many consider to be the prime culprit in the “surveillance state,” sought to persuade the crowd at the annual DefCon hacker gathering to enter government service.
Next post in Security News