Access "Economic recovery strategies for information security professionals"
This article is part of the April 2010 issue of Combatting the new security threats of today's mobile devices
During the depths of the recession last year, a global company with 1,700 employees laid off its three-member security department, along with half of its IT department, recalls Mark Kadrich, CEO of The Security Consortium, a security-services firm. "People who weren't directly associated with producing or supporting product were considered expendable," says Kadrich, who also is president of the Silicon Valley chapter of the Information Systems Security Association (ISSA). At the other end of the spectrum, growing corporate recognition of the importance of security along with ever-present compliance requirements protected some security teams from the worst effects of the recession. In between, lots of CISOs and security managers were forced to put projects on hold and stretch tight budgets. Now, with a few spotty signs of an economic recovery, what should security teams be doing to prepare for better times? What should they be focusing on to position themselves for success when a recovery takes full force? Security professionals and industry experts say savvy... Access >>>
Premium Content for Free.
ISP shutdown slows Zeus botnet
Security experts say the Zeus botnet was slowed with the shutdown of Troyak, an ISP serving a large chunk of the Zeus botnet
Removable storage device endpoint security and control
by Lisa Phifer, Contributor
Endpoint security and control for devices like thumb drives, SIM cards and mobile devices can no longer be ignored.
- ISP shutdown slows Zeus botnet
Economic recovery strategies for information security professionals
Security teams will continue to focus on efficiency and alignment with business as the economy recovers
Technologies to thwart online banking fraud
by Jerry Silva
Today's anti-fraud technologies create gated communities for online banking.
- Economic recovery strategies for information security professionals
Information Security Profession Takes Two Steps Backward
The information security profession took two steps backwards with the firing of Pennsylvannia's CISO because of his comments on a conference panel, which illustrates the continuing disconnect between management and information security.
Schneier-Ranum Face-Off: Should the Government Stop Outsourcing Code Development?
Is outsourcing code development a threat to national security? Marcus Ranum and Bruce Schneier go head-to-head on this topic.
Cloud computing legal issues
Lawyers have a lot of concerns about cloud computing services. Learn about cloud computing legal issues
- Information Security Profession Takes Two Steps Backward
More Premium Content Accessible For Free
Unified threat management (UTM) long focused on small and medium-sized businesses, but now it's climbing the ladder and attempting to become ...
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...
All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...