Access "Layer 8: Time to call a security specialist?"
This article is part of the January 2006 issue of How to stop data leakage
As information security becomes increasingly operationalized, will security specialists still be needed? I field an awful lot of questions along the line of, "Who should the information security staff report to?" A more apropos question would be, "Should there even be an information security function?" Those who have just finished multi-year struggles to break into the interesting field of infosecurity aren't keen to hear that they might soon become obsolete. In the early '90s, the burgeoning Internet attracted not only some pretty interesting new Web technologies, but also a growing number of businesses and hackers. Given the embryonic state of network security knowledge, and the almost nonexistent market for protective products, it was natural that security would become a specialty area. Corporate infosecurity pioneers spent a lot of time cobbling together firewalls from scratch or poorly documented kits. Although it took relatively less raw skill, cleaning viruses off of hard drives and floppy diskettes was the second biggest security time sink. Security ... Access >>>
Premium Content for Free.
Recent Releases: Security product briefs, January 2006
Learn about the security products that launched in January 2006.
Authentication: TriCipher Armored Credential System v3.1.1
by Steven Weil, Contributor
TriCipher's TACS v3.1.1
Preventing Data Theft, Combating Internal Threats
Defend against internal threats and prevent information leakage and hacker attacks with several tactics such as employee monitoring, behavioral analysis tools, encryption and incident response.
Your routers and switches can yield a mother lode of security information about your network--if you know where to dig
by Dr. Juergen Schneider
This tip covers ways that you can secure a network to protect data from internal as well as external attacks.
- Recent Releases: Security product briefs, January 2006
Peak of Security
IE 7.0, Firefox, Netscape: One of these browsers comes out on top—we'll tell you which one.
Secure Reads: Security and Usability
Read a review of the book Security and Usability.
Hot Pick: M-Tech Information Technology's ID-Synch 4.0
M-Tech Information Technology's ID-Synch v4.0
Help From Above
Security managers are looking to the keepers of the Internet cloud for relief.
- Peak of Security
Perspectives: Midmarket organizations short on security budgets and respect
Industry solutions are tailored for big companies and big budgets--leaving SMBs in the dust.
Ping: Marcus Sachs
Editor's Desk: The state of patching
Party Like It's 1999?
Layer 8: Time to call a security specialist?
- Perspectives: Midmarket organizations short on security budgets and respect
More Premium Content Accessible For Free
Unified threat management (UTM) long focused on small and medium-sized businesses, but now it's climbing the ladder and attempting to become ...
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...
All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...