Access "IT security spending 2004: Firms diversify as security budgets tighten"
This article is part of the April 2004 issue of Depth charge: Survey shows big spending on defense in depth
Patrick Heim keeps a watchful eye on the clock. Not the clock in his San Francisco office, but what he calls the "virus doomsday clock," which counts down the time until the perfect worm brings the Internet to its knees. Unlike IDS, a well-tuned IPS won't require a lot of baby-sitting. Patrick Heim, VP of Enterprise Security, McKesson "We're at about 5 minutes 'til midnight," says Heim, VP of enterprise security at McKesson, a $50 billion provider of health care management products and services. "We've already seen hybrid code that crosses over multiple platforms. We've seen code that creates hive networks that talk to each other. We've seen destructive ones. We've seen flooding ones. If someone synthesized the worst aspects of these into something new, we could be in deep trouble." What's Heim doing about the threat of a doomsday worm? Everything he can, including beefing up risk assessment activities, tightening system configurations and access controls, running different flavors of AV on the gateway, servers and desktops, and evaluating new host- and ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
IT security spending 2004: Firms diversify as security budgets tighten
by Andrew Briney
Fearing the worst on IT security spending, companies are diversifying their security spending.
-
Audit failure: How one lab raised IT security awareness and its audit grade
by Anne Saita
Learn how Argonne National Lab raised IT security awareness and its audit grade from 'F' to 'A'.
-
IT security spending 2004: Firms diversify as security budgets tighten
by Andrew Briney
-
-
The future of software security vulnerabilities
by Gary McGraw & Greg Hoglund
The evolution of software security vulnerabilities opens new vistas for business... and the bad guys.
-
Ensure audit success with sound security audit procedures
by George Wrenn
A security review doesn't have to be a sink-or-swim proposition.
-
The future of software security vulnerabilities
by Gary McGraw & Greg Hoglund
-
Columns
-
Using tax depreciation to increase security budgets
by Lawrence Walsh
The depreciation of capital assets, such as security hardware and software, is a tax benefit that every infosec manager should take into consideration.
-
Cyberwar myths: Are cyberwarfare and cyberterrorism overblown?
by Marcus Ranum
Marcus Ranum explains why the whole notion of cyberwarfare is a scam.
-
A little betrayal: Windows purists using Linux security features
by Jay Beale
Jay Beale explains how Windows purists can leverage Linux security features without compromising their allegiance to Redmond.
-
Database security tools for preventing SQL injection attacks
by Pete Lindstrom, Contributor
An emerging breed of database security tools is helping security teams spot attackers' favorite techniques, like SQL injection.
-
In enterprises, proactive information security finally taking hold
by Andrew Briney
Editorial director Andrew Briney says frustration with failure is driving proactive information security spending on new technologies.
-
Using tax depreciation to increase security budgets
by Lawrence Walsh
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO