Print Issue: September 04, 2012
Flame’s cryptofunctionality silenced all the haters, says F-Secure’s Mikko Hyppönen.
The ability to marry physical and logical security controls is maturing, which means companies can find efficiency wins, while in the process lowering their risk profile.
Applications provide the path to an organization’s coveted assets. And even if they’re not public-facing, they still can be a ripe target. We talk to Marcus Prendergast, CSO of ITG, for this month’s cover story.
When the history of the cyber arms race is written, the first chapter surely will be devoted to Stuxnet. But now that these sophisticated strikes have started, there are plenty of questions to answer.
With breaches grabbing headlines and cash funneling toward infosec budgets, the role of the security executive is shifting from tech and compliance wonk to savvy businessperson.
President Obama now is considering an executive order to breathe some life back into the Cyber Security Act of 2012 with the goal in mind to protect the country’s critical infrastructure.
Policies form the cornerstone of the information security program and are instrumental for enforcing global consistency, driving change and launching enterprise programs.
Next post in Opinions