Access "Industry needs less ethical computer hacking, more risk management strategies"
This article is part of the May 2004 issue of Are you secure? Adam Putnam says, "Prove it!"
I recently shared a lecturn at a security conference in London with a speaker who proudly proclaimed to the audience that he was a "white hat hacker." You could practically hear the spurs jangling. Such pompous claims of hero status were common during the dot-com heyday, when infosecurity pros were rough-and-tumble cowboys trying to tame the digital Wild West. But we no longer need white hats to protect us against black hat villains. The excitement of dueling with hackers was a lure that attracted far too many of today's info-security practitioners into our profession. Consequently, the prairie is littered with people who are easily distracted by glitzy technology and the prospect of adventure. Turned off by the day-to-day requirements of security management, these cowboys want to play Wyatt Earp--on company time, with company money. Who can blame them? There's nothing sexy about setting policies, hardening and patching systems and managing change. In spite of the growing prominence of certifications such as the CISSP, there are still too many old hands who ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Should new information security laws include auditing requirements?
by Erik Sherman
Get your security act together or Adam Putnam will do it for you. Federal information security laws and regulations could be the next thing infosec management has to worry about. Here you will learn about pending security laws requring security auditing requirements in this feature.
-
Exploring additional technologies to support antivirus scanning
by George A. Chidi Jr.
Security managers are looking beyond conventional AV to ensure business continuity and improve disaster recovery times.
-
Using email spam filtering techniques to get rid of spam
by Amber Plante
Filters stem the flow of junk email, but spam remains a big distraction. Learn how to use spam filtering techniques to get rid of spam.
-
Should new information security laws include auditing requirements?
by Erik Sherman
-
-
Secure data transmission with wireless access controllers
by Jon Edney
Sending data over the airwaves is risky. Wireless access controllers assure secure data transmission and reception.
-
Why and how the CISO job description is changing
by Gary Lynch
Reinvent your job or watch it disappear.
-
Secure data transmission with wireless access controllers
by Jon Edney
-
Columns
-
Government cybersecurity: What is being done to fight cybercrime?
by Lawrence M. Walsh
Learn what can be done to fight cybercrime against privately owned networks.
-
Industry needs less ethical computer hacking, more risk management strategies
by Jay Heiser, Contributor
Enterprises need less ethical computer hacking and a better risk management strategy.
-
How to avoid Windows XP Service Pack 2 problems
by Victor R. Garza
Testing XP SP2 beta today will pay off in the long run and help admins to avoid any Windows XP Service Pack 2 problems.
-
Enhancing secure coding practices to secure your machine
by Pete Lindstrom, Contributor
Learn preventative measures to help improve secure coding practices and protect and secure your machine from the latest threats.
-
Laws of security: 10 security best practices
by Andrew Briney
Learn the laws of security and 10 security best practices.
-
Government cybersecurity: What is being done to fight cybercrime?
by Lawrence M. Walsh
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO