Access "Information Security Profession Takes Two Steps Backward"
This article is part of the April 2010 issue of Combatting the new security threats of today's mobile devices
I met Bob Maley a year ago at Black Hat when a mutual friend introduced us. I'd learned about him 18 months earlier when former colleague Dennis Fisher interviewed him in the pages of Information Security magazine. His was a noteworthy story; Maley, CISO of the state of Pennsylvania at the time, built the state's information security program from nothing. In four years on the job, Maley oversaw an overhaul of ancient security policies for the state's 47 agencies. He brought in intrusion prevention technology to the state's networks and introduced identity and access management in order to get a handle on who was doing what with the state's digital assets. He did outreach with the security community in order to stay abreast of what was happening in a very fluid environment, and took what he learned to best introduce security concepts to the state government culture. And that outreach cost him his job and smudged all that good work. Maley took part in a panel at the recent RSA Conference alongside other state CISOs. He made a mistake during the discussion and ... Access >>>
Premium Content for Free.
ISP shutdown slows Zeus botnet
Security experts say the Zeus botnet was slowed with the shutdown of Troyak, an ISP serving a large chunk of the Zeus botnet
Removable storage device endpoint security and control
by Lisa Phifer, Contributor
Endpoint security and control for devices like thumb drives, SIM cards and mobile devices can no longer be ignored.
- ISP shutdown slows Zeus botnet
Economic recovery strategies for information security professionals
Security teams will continue to focus on efficiency and alignment with business as the economy recovers
Technologies to thwart online banking fraud
by Jerry Silva
Today's anti-fraud technologies create gated communities for online banking.
- Economic recovery strategies for information security professionals
Information Security Profession Takes Two Steps Backward
The information security profession took two steps backwards with the firing of Pennsylvannia's CISO because of his comments on a conference panel, which illustrates the continuing disconnect between management and information security.
Schneier-Ranum Face-Off: Should the Government Stop Outsourcing Code Development?
Is outsourcing code development a threat to national security? Marcus Ranum and Bruce Schneier go head-to-head on this topic.
Cloud computing legal issues
Lawyers have a lot of concerns about cloud computing services. Learn about cloud computing legal issues
- Information Security Profession Takes Two Steps Backward
More Premium Content Accessible For Free
The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...
Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...