Access "Security practitioners should demand security intelligence sharing"
This article is part of the September 2004 issue of Mission critical: Securing the critical national infrastructure
Here's a paradox we constantly deal with: Security is dependent upon communication, yet few are willing to talk about it. Security practitioners are among the tightest-lipped corporate beings in the world. Sure, put a bunch of propeller heads in a room together and they'll bad-mouth every Windows vulnerability they've ever come across. But don't expect specific, meaningful details about their companies' security programs. There are good reasons for shutting up. If you spill the beans about last week's security incident, you run the risk of diminishing shareholder and customer confidence--and getting fired. If you talk about your security architecture and strategy, you may reveal vital information to miscreants and hackers. And, if you boast about your security, you paint a big bull's-eye on your enterprise. Yet, when Information Security examined the state of critical infrastructure security (see "Mission: Critical"), we found that the key to protecting digital assets, and, ultimately, national security, is the open and continuing exchange of information and... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
U.S. critical infrastructure security: Highlighting critcal infrastructure threats
by STEPHEN BARLAS, ALAN EARLS, MICHAEL FITZGERALD, JERRI LEDFORD AND DENNIS MCCAFFERTY
Despite heightened post-9/11 security awareness, the U.S. is exposed to numerous critical infrastructure threats.
-
Outsourcing best practices: Identifying offshoring risks
by Erik Sherman, Contributor
Offshoring is good for business, but lax security practices can torpedo your investment.
-
U.S. critical infrastructure security: Highlighting critcal infrastructure threats
by STEPHEN BARLAS, ALAN EARLS, MICHAEL FITZGERALD, JERRI LEDFORD AND DENNIS MCCAFFERTY
-
-
Web app security devices highlight source code vulnerabilities
by James C. Foster, Contributor
Emerging Web app security services and products bring source code vulnerabilities to light, writes James C. Foster.
-
Web app security devices highlight source code vulnerabilities
by James C. Foster, Contributor
-
Columns
-
Security practitioners should demand security intelligence sharing
by Lawrence M. Walsh
Would you tell your enterprise security secrets if you could hear others? Lawrence Walsh explains why he thinks communication in the security field is lacking.
-
Forming enterprise security best practices from past mistakes
by Jay Heiser, Contributor
Measuring risk and forming best practices relies on learning from past experiences. Analyst Jay Heiser explains how security tactics in the past, echo in todays world.
-
Patch deployment best practices: Rushing patches isn't always better
by Victor Garza, Contributor
Do you rush to deploy patches, hot fixes or service packs as soon as possible? Victor Garza explains why this may not necessarily be the right decision.
-
What the Watchfire-Sanctum acquisition means for Web app security
by Pete Lindstrom, Contributor
See why Watchfire's acquisition of Sanctum does not spell the end for web app security.
-
Information security careers: Are information security officers a dying breed?
The information security officer will soon go the way of the dodo bird.
-
Security practitioners should demand security intelligence sharing
by Lawrence M. Walsh
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO