Access "Information security roles and technology shifts"
This article is part of the April 2012 issue of An expert guide to tokenization and using it effectively
The organizational role of the information security professional sits at a crossroads that may be more meaningful than we realize. The security world is in the midst of major changes as businesses struggle with the simultaneous evolution of technology, economics, and business applications of new technologies. We can look back at the information protection challenges that occurred when organizations first connected business systems to the Internet and consider how the role of the security manager took on expanded meaning due to new threats. The current environment may be presenting a course correction of similar magnitude for information security roles. Several new technology areas grabbing headlines at present have been on the horizon for some time, but adoption seems only now to be gaining momentum across the general business spectrum. Cloud computing, virtualization, and mobility, for example, have all existed in some usable form for years, however, each is now attaining significant degrees of technical maturity, market acceptance, and the integration ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Unified threat management devices for the enterprise
by Joel Snyder, Contributor
UTMs aren’t just for SMBs anymore. Here are four requirements for enterprise-grade UTM.
-
AMI networks: PKI security considerations
by Seth Bromberger, Contributor
PKI components in smart grid and AMI infrastructure introduce new hazards.
-
Unified threat management devices for the enterprise
by Joel Snyder, Contributor
-
-
Understanding tokenization: What is tokenization and when to use it
by Adrian Lane, Contributor
Tokenization protects sensitive data to reduce the compliance burden.
-
Web browser security features make attacks harder
by Robert Westervelt, News Director
Accuvant analysis and hacking contests illustrate browser security improvements.
-
Understanding tokenization: What is tokenization and when to use it
by Adrian Lane, Contributor
-
Columns
-
Don’t turn security Big Data analysis into a forgettable cliché
by Michael S. Mimoso, Editorial Director
It’s easy to be cynical about the latest security buzzword, but don’t be so quick to dismiss it.
-
Marcus Ranum chat: Security startups and security innovation
by Marcus Ranum
Security expert Marcus Ranum talks with Peter Kuper, a partner with In-Q-Tel focused on funding compelling startups to accelerate innovation for the intelligence community.
-
Information security roles and technology shifts
by Paul Rohmeyer, Contributor
New technologies and business models are rapidly changing the role of the security pro.
-
Don’t turn security Big Data analysis into a forgettable cliché
by Michael S. Mimoso, Editorial Director
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO