Access "Ping: Dave Drab"
This article is part of the July/August 2007 issue of CISO survival guide: 18 of the best security tips
Dave Drab is a rarity. A career FBI man who started out in the identification division and spent a number of years bringing down various Mafia families in the Midwest, Drab recognized early on the growing importance of computers in criminal investigations. Now the head of information and content security services at Xerox Global Services, Drab puts his expertise to work in protecting customers' most valuable assets: intellectual property. Dave Drab How big was the insider threat to intellectual property seven or eight years ago when you were with the FBI and were involved in the case that produced the first indictment under the Economic Espionage Act? Before we encountered this new world that we live in today--that's highly globalized and highly technical with Internet connectivity, digitalization of all information assets, diversified business models and new technologies that are constantly inundating the business environment--we began to see that the traditional methods of protecting information had changed. In the old sense, you had critical assets you ... Access >>>
Premium Content for Free.
Emerging Technologies: How to secure new products
New business initiatives mean new threats.
Protecting Your Brand
Customer confidence is at risk when a breach occurs.
Is perimeter security viable with Swiss cheese networks?
At Your Service: Veracode's SaaS-based application analysis
Metasploit Framework 3.0 Product Review
In this product review, learn everything about the Metasploit Framework 3.0, a penetration testing tool for Linux and Windows platforms.
- Emerging Technologies: How to secure new products
Success requires skills in business, technology and people.
Antivirus: ESET's NOD32 Antivirus 2.7
ESET's NOD32 Antivirus 2.7
Unified Threat Management: Secure Computing's Sidewinder 2150 v7
Secure Computing's Sidewinder 2150 v7
Encryption software vendors can expect challenge from hardware front
Until now, the laptop encryption market has belonged to software vendors. Learn how all that has changed.
Endpoint Security: F-Secure's Client Security 7.0
F-Secure's Client Security 7.0
- Office Politics
More Premium Content Accessible For Free
In the rush to capitalize on big data, many companies forget that developing an ecosystem of structured and unstructured data means higher risk of ...
Unified threat management (UTM) long focused on small and medium-sized businesses, but now it's climbing the ladder and attempting to become ...
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...