Access "Security transitions: Changes that make a difference"
This article is part of the April 2013 / Volume 15 / No. 3 issue of Managing identities in hybrid worlds
As Gary McGraw mentions in his [In]Security column this month, the continuing flow of news about sophisticated, international cybercrime—so prominent in the media recently—might finally have gotten to us. In a good way. A lot of words have been squandered in proclaiming the death of antivirus scanning, the collapse of the endpoint, and the inability of traditional intrusion detection systems to serve any good purpose against advanced threats; and yet, we have seen no paradigm shift in the trenches where it counts. McGraw’s primary solution, one that I’ve always been inclined to favor, lies in developing more security capable software. I don’t know that game changing shifts in the resilience of software should be expected anytime in the near future though. Our education columnists Doug Jacobson and Julie Rursch note that college classes in software development generally give security issues a cold shoulder, saying that “…In our software classes, we focus on getting students to program and to learn the aspects of the language. Seldom do we ask them to consider... Access >>>
Premium Content for Free.
Managing identities in hybrid worlds
by Peter H. Gregory
Are you losing control of access management as SaaS and mobile devices take hold? To achieve better operational consistency and scale, consider a centralized IAM system.
Address IPv6 security before your time runs out
by Fernando Gont
Most networks have partial deployment of IPv6 often without IT realizing it. It’s time to take stock of the security implications before attackers do.
- Managing identities in hybrid worlds by Peter H. Gregory
Botnet takedowns: A dramatic defense
by Kathleen Richards
The infections and cyberattacks that botnets are used to launch remain hard-to-detect malware threats that have moved beyond PCs to mobile devices.
- Botnet takedowns: A dramatic defense by Kathleen Richards
Security transitions: Changes that make a difference
by Robert Richardson
This month, Information Security Magazine examines security industry changes that can really make a difference: improving identity management and building security into software from the get go.
CISOs: From no seat to multiple hats
by David J. Sherry
The CISO role in many enterprises is expanding beyond security risk mitigation to risk management, privacy and regulations, and compliance.
Why information security education isn’t making the grade
by Doug Jacobson and Julie A. Rursch
Security experts explain why a holistic approach to security is critical to training computer engineers and computer scientists for a career in information security.
Cyberwar calls for software and system investment, not hacking back
by Gary McGraw, Contributor
Hacking back isn't the way to win the cyberwar. Gary McGraw says building software and systems with fewer vulnerabilities is stronger protection.
- Security transitions: Changes that make a difference by Robert Richardson
More Premium Content Accessible For Free
Does Windows 8.1 meet the demands of the BYOD age?
The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...
Application security policy after Heartbleed
Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...
Devising a security strategy for the modern network
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...