Access your Pro+ Content below.
Cyberspace protection requires government collaboration with industry
This article is part of the July/August 2012 issue of Information Security magazine
There are several pre-eminent facts that stand out when one is examining cyberspace. For starters, success in today’s dynamic cyberspace domain requires immediate access and advanced awareness to leading-edge technologies and thought leaders. This becomes extremely important in a man-made domain where attacks are constant. Having the ability to determine what capabilities are available in commercial technology (COTS) to support government or private sector requirements is critical for cyberspace protection. Appreciating that the majority of this intellectual capital resides with the global communities of the private sector makes collaboration with industry paramount. As this domain demands speed and where latency breeds contempt, how do we effectively bridge requirements with capabilities? The interconnectedness of cyberspace with its man‑made origins presents both enormous challenges and significant opportunities, neither of which have been effectively leveraged. With the advent of the Internet more than 40 years ago, we have ...
Access this Pro+ Content for Free!
Features in this issue
Learn pen testing best practices and how to build an internal pen testing team.
New techniques are emerging to help organizations analyze security data and improve security defenses.
SharePoint has become ubiquitous in the enterprise, but organizations can overlook security. Learn SharePoint security best practices in this article.
Restricting user permissions, server hardening and dedicated service accounts are critical.
Experts say malware toolkit isn’t unique, but warn of cyberweapons falling into the wrong hands.
Columns in this issue
Mobile systems have a lot of moving parts, but securing them is as simple as practicing software security.
Government and private sector collaboration is critical to surviving in cybespace.
Breach at the professional networking site highlights password practices, storage procedures.