Access "Protecting Your Brand"
This article is part of the July/August 2007 issue of CISO survival guide: 18 of the best security tips
Stormy Weather Customer confidence is at risk when a data breach occurs. When TJX Corp. reported lower profits for the first quarter of 2007, CEO and president Carol Meyrowitz said "comparable store sales results in April were below our expectations, which we attribute to the unseasonably cold and wet weather across most regions of the country during the first half of the month." Was she actually blaming April showers--not the biggest credit-card number heist in history--for disappointing sales at TJX discount stores T.J. Maxx, Marshalls, Bob's Stores and others? But Meyrowitz's comment was not far-fetched. "It's almost impossible to correlate a security breach to retail sales," says John Pescatore, a vice president at Gartner. Weather patterns, layoffs, expansion, fuel costs and yes, well-publicized security breaches--all of these affect a company's bottom line to varying degrees. Indeed, it's safe to say that some of TJX's longtime customers will continue to shop at its stores. Yet others will view T.J. Maxx with suspicion for months or years to come, ... Access >>>
Premium Content for Free.
Emerging Technologies: How to secure new products
New business initiatives mean new threats.
Protecting Your Brand
Customer confidence is at risk when a breach occurs.
Is perimeter security viable with Swiss cheese networks?
At Your Service: Veracode's SaaS-based application analysis
Metasploit Framework 3.0 Product Review
In this product review, learn everything about the Metasploit Framework 3.0, a penetration testing tool for Linux and Windows platforms.
- Emerging Technologies: How to secure new products
Success requires skills in business, technology and people.
Antivirus: ESET's NOD32 Antivirus 2.7
ESET's NOD32 Antivirus 2.7
Unified Threat Management: Secure Computing's Sidewinder 2150 v7
Secure Computing's Sidewinder 2150 v7
Encryption software vendors can expect challenge from hardware front
Until now, the laptop encryption market has belonged to software vendors. Learn how all that has changed.
Endpoint Security: F-Secure's Client Security 7.0
F-Secure's Client Security 7.0
- Office Politics
More Premium Content Accessible For Free
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...
Despite the enormous concerns around cloud security, many information security professionals remain on the sidelines when it comes to their ...