Access "Recession forces security to measure and prioritize risks"
This article is part of the February 2009 issue of Improving your network security strategy in a recession
Information Security February issue download Download the entire February issue of Information Security magazine here in PDF format. By MICHAEL S. MIMOSO, Editor Grimly and anticlimactically, the National Bureau of Economic Research made it official on Dec. 1 that the United States economy had been in a recession for more than a year. The projections for when the wounded dollar would be able to right itself weren't much better, with experts forecasting a continued downturn throughout this year with slight recovery starting in 2010. Few markets are immune to a recession, yet information security seems somewhat armored against economic troubles. Why? Compliance requirements don't deflate in a recession. Hackers don't lower their swords in a recession. Laid off insiders aren't less disgruntled in a recession. And integration woes brought on by endless mergers aren't lessened in a recession. But information security isn't completely recession proof. CISOs are facing flat budgets (or ever-so-slight increases) and non-essential projects and upgrades are being ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
10 tips to improve your network security strategy in a recession
Here are 10 steps you can take to improve your threat management posture that require minimum investment, manpower and give you a fast return on your investment.
-
Recession forces security to measure and prioritize risks
Compliance demands, hacker threats, insider risks and integration concerns brought on by mergers and acquisitions make information security somewhat recession proof.
-
Encryption, DLP, disaster recovery top 2009 priorities
Information Security magazine's annual Priorities 2009 survey identifies data protection and disaster recovery among the top priorities for security managers.
-
Product Review: IronKey Enterprise Secure Flash Drive
by Ed Tittel, Contributor
IronKey Enterprise Secure Flash Drives enable organizations to control access to sensitive information on portable flash drives.
-
10 tips to improve your network security strategy in a recession
-
-
Product Review: PGP Endpoint
PGP Endpoint provides automated whole disk encryption that is centrally managed.
-
Product Review: Rohati TNS 100
Rohati's Transaction Network System brings NAC to the application level, and delivers granular access control for Web-based applications and file shares.
-
Product Review: Astaro Mail Gateway 4000
Astaro Mail Gateway 4000 is an antivirus and antispam appliance that is suitable for a midmarket organizations because of its simple central management capabilities.
-
Product Review: PGP Endpoint
-
Columns
-
Vein-reader biometric authentication for health care, financials
Health care facilities, along with financial institutions, are prime market targets for vein-reading technology, the latest in biometric applications.
-
Shoestring security budgets mean innovation and prioritization
Security managers face a lean economic year in 2009, but that doesn't mean threats and compliance demands will abate.
-
Proactive state privacy laws change security focus to prevention
New data breach notification acts in Nevada and Massachusetts are changing the way that organizations handle data.
-
Schneier, Ranum debate social networking risks
Should companies be concerned about employees' social networking? Bruce Schenier and Marcus Ranum take opposite sides on this issue.
-
Vein-reader biometric authentication for health care, financials
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...