Access "Editor's Desk: Freeing Julie Amero"
This article is part of the July/August 2007 issue of CISO survival guide: 18 of the best security tips
Kudos to the security community for its role in overturning the conviction of a Connecticut school teacher. Turns out, Julie Amero needed a CISO more than she needed a lawyer. Amero is the Norwich, Conn., substitute teacher who was facing up to 40 years in jail after she was convicted in January on charges she put the morals of her students at risk by not doing enough to prevent them from viewing an onslaught of porn pop-ups that had overtaken a classroom PC. She was granted a new trial in early June after an outpouring of support from the security, legal and education professions, and pro-bono forensics work from a team of experts that turned up enough evidence to put the guilty verdict in question. Judge Hillary Strackbein, in ordering a new trial, said a detective who testified for the defense had provided erroneous testimony, and there's a good chance the case will get thrown out and Amero's ordeal will be over. Amero, an admitted computer noob, became a cause celebre among security and forensics folks. The evidence was spotty against her and ... Access >>>
Premium Content for Free.
Emerging Technologies: How to secure new products
New business initiatives mean new threats.
Protecting Your Brand
Customer confidence is at risk when a breach occurs.
Is perimeter security viable with Swiss cheese networks?
At Your Service: Veracode's SaaS-based application analysis
Metasploit Framework 3.0 Product Review
In this product review, learn everything about the Metasploit Framework 3.0, a penetration testing tool for Linux and Windows platforms.
- Emerging Technologies: How to secure new products
Success requires skills in business, technology and people.
Antivirus: ESET's NOD32 Antivirus 2.7
ESET's NOD32 Antivirus 2.7
Unified Threat Management: Secure Computing's Sidewinder 2150 v7
Secure Computing's Sidewinder 2150 v7
Encryption software vendors can expect challenge from hardware front
Until now, the laptop encryption market has belonged to software vendors. Learn how all that has changed.
Endpoint Security: F-Secure's Client Security 7.0
F-Secure's Client Security 7.0
- Office Politics
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...