Access "Ping: Marcus Sachs"
This article is part of the January 2006 issue of How to stop data leakage
MARCUS SACHS ISN'T SHY ABOUT SETTING LOFTY GOALS-- LIKE SAVING THE INTERNET FROM ITSELF. HOW DOES THE DEPUTY DIRECTOR OF SRI INTERNATIONAL'S COMPUTER SCIENCE LAB--THE R&D ARM OF DHS--PLAN TO PULL THIS OFF? FOSTERING PUBLIC-PRIVATE SECTOR COLLABORATION IS A PRIORITY, AS IS DEVELOPING A SANITIZED INTERNET FOR RESEARCH PURPOSES. How does the private sector help shape what DHS should be working on? We attend as many private sector events as possible and talk with several hundred ISPs, equipment manufacturers and vendors. These companies collaborate with us to provide DHS with input for projects like DNSSEC and secure routing. DHS has funded a number of research groups that bring us great insight. They are real-life companies; they're in the market making money and struggling just like everyone else. They are our forward-observer eyes--they are way out in front and bring information and intelligence that help us understand what is really happening in the business world. How does it benefit an enterprise to share information with DHS? Enterprises bring a broad ... Access >>>
Premium Content for Free.
Recent Releases: Security product briefs, January 2006
Learn about the security products that launched in January 2006.
Authentication: TriCipher Armored Credential System v3.1.1
by Steven Weil, Contributor
TriCipher's TACS v3.1.1
Preventing Data Theft, Combating Internal Threats
Defend against internal threats and prevent information leakage and hacker attacks with several tactics such as employee monitoring, behavioral analysis tools, encryption and incident response.
Your routers and switches can yield a mother lode of security information about your network--if you know where to dig
by Dr. Juergen Schneider
This tip covers ways that you can secure a network to protect data from internal as well as external attacks.
- Recent Releases: Security product briefs, January 2006
Peak of Security
IE 7.0, Firefox, Netscape: One of these browsers comes out on top—we'll tell you which one.
Secure Reads: Security and Usability
Read a review of the book Security and Usability.
Hot Pick: M-Tech Information Technology's ID-Synch 4.0
M-Tech Information Technology's ID-Synch v4.0
Help From Above
Security managers are looking to the keepers of the Internet cloud for relief.
- Peak of Security
Perspectives: Midmarket organizations short on security budgets and respect
Industry solutions are tailored for big companies and big budgets--leaving SMBs in the dust.
Ping: Marcus Sachs
Editor's Desk: The state of patching
Party Like It's 1999?
Layer 8: Time to call a security specialist?
- Perspectives: Midmarket organizations short on security budgets and respect
More Premium Content Accessible For Free
FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-ins is real. This guide to secure ...
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...