Access "Ping: Marcus Sachs"
This article is part of the January 2006 issue of How to stop data leakage
MARCUS SACHS ISN'T SHY ABOUT SETTING LOFTY GOALS-- LIKE SAVING THE INTERNET FROM ITSELF. HOW DOES THE DEPUTY DIRECTOR OF SRI INTERNATIONAL'S COMPUTER SCIENCE LAB--THE R&D ARM OF DHS--PLAN TO PULL THIS OFF? FOSTERING PUBLIC-PRIVATE SECTOR COLLABORATION IS A PRIORITY, AS IS DEVELOPING A SANITIZED INTERNET FOR RESEARCH PURPOSES. How does the private sector help shape what DHS should be working on? We attend as many private sector events as possible and talk with several hundred ISPs, equipment manufacturers and vendors. These companies collaborate with us to provide DHS with input for projects like DNSSEC and secure routing. DHS has funded a number of research groups that bring us great insight. They are real-life companies; they're in the market making money and struggling just like everyone else. They are our forward-observer eyes--they are way out in front and bring information and intelligence that help us understand what is really happening in the business world. How does it benefit an enterprise to share information with DHS? Enterprises bring a broad ... Access >>>
Premium Content for Free.
Recent Releases: Security product briefs, January 2006
Learn about the security products that launched in January 2006.
Authentication: TriCipher Armored Credential System v3.1.1
by Steven Weil, Contributor
TriCipher's TACS v3.1.1
Preventing Data Theft, Combating Internal Threats
Defend against internal threats and prevent information leakage and hacker attacks with several tactics such as employee monitoring, behavioral analysis tools, encryption and incident response.
Your routers and switches can yield a mother lode of security information about your network--if you know where to dig
by Dr. Juergen Schneider
This tip covers ways that you can secure a network to protect data from internal as well as external attacks.
- Recent Releases: Security product briefs, January 2006
Peak of Security
IE 7.0, Firefox, Netscape: One of these browsers comes out on top—we'll tell you which one.
Secure Reads: Security and Usability
Read a review of the book Security and Usability.
Hot Pick: M-Tech Information Technology's ID-Synch 4.0
M-Tech Information Technology's ID-Synch v4.0
Help From Above
Security managers are looking to the keepers of the Internet cloud for relief.
- Peak of Security
Perspectives: Midmarket organizations short on security budgets and respect
Industry solutions are tailored for big companies and big budgets--leaving SMBs in the dust.
Ping: Marcus Sachs
Editor's Desk: The state of patching
Party Like It's 1999?
Layer 8: Time to call a security specialist?
- Perspectives: Midmarket organizations short on security budgets and respect
More Premium Content Accessible For Free
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...
In the rush to capitalize on big data, many companies forget that developing an ecosystem of structured and unstructured data means higher risk of ...
As the number of Internet-connected devices grows, the potential security challenges of the so-called "Internet of Things," or IoT, can no longer be ...