Access your Pro+ Content below.
Cloud initiatives are changing roles for information security managers
This edition features the results of our 2011 priorities survey. Today's information security managers are getting more of a say in enterprise cloud initiatives and mobile device projects. Plus, learn from the experts about the best ways to enforce endpoint security.
Features in this issue
Information security managers are getting more of a say in enterprise cloud initiatives and mobile device projects.
Enforcing endpoint security requires careful planning and deployment.
Stuxnet put the spotlight on critical infrastructure protection but will efforts to improve SCADA security come too late?
Columns in this issue
Security experts Bruce Schneier and Marcus Ranum debate whether network security should be based on whitelisting or blacklisting.
Automation hasn't killed the penetration tester – yet.
A look back at articles from the past shows that the same information security problems persist today.