Access your Pro+ Content below.
Disaster recovery plans and DLP solutions top 2010 priorities
This article is part of the January/February 2010 issue of Information Security magazine
For Scott Floyd, director of information security at a Texas-based community bank, 2010 will be the year to prioritize disaster recovery and business continuity. Driven by a corporate initiative to expand protection of its mission-critical systems, the bank last year implemented a lot of virtualization technology in order to failover data centers within minutes instead of days. "2010 will be tying all those technology choices together to implement a much better recovery plan," Floyd says. His priority falls right in line with a top concern cited by readers who participated in Information Security's Priorities 2010 survey. Seventy-seven percent of the more than 700 respondents rank disaster recovery as a priority this year and 71 percent say business continuity is a top concern. Readers also cite compliance, data loss prevention, and access control as top priorities for 2010. And they're worried about managing emerging threats via the Web as well as the risks posed by social media. Still, budgets remain flat for the most part, ...
Features in this issue
Massachusetts 201 CMR 17.00 and Nevada's data protection law establish new standards for personal data protection
Learn how endpoint data loss prevention technology complements network DLP and secures data that users interact with on laptops, mobile and portable storage devices.
Disaster recovery plans, DLP solutions, and regulatory compliance are top enterprise priorities, according to Information Security's Priorities 2010 survey
Secure coding and vulnerability scanning could mitigate many Web application attacks
Columns in this issue
IT and security managers often make the mistake of being consumed with a specific risk or threat to the detriment of security
Security experts Bruce Schneier and Marcus Ranum debate the possibility of eliminating anonymity on the Internet.
China's hacker attacks against Google's infrastructure, including Gmail accounts of human rights activists as well as Google's source code, should be used to educate enterprises about the reality of cyberespionage from nation states and organized criminals.