Access "Blow Out the Candles"
This article is part of the December 2007/January 2008 issue of Reflections on the impact of Sarbanes-Oxley
Turning 10 is a landmark occasion, a day when you hit double figures, inch toward adolescence and start to leave immaturity behind. Your experiences and observations of life are just beginning. For a magazine, especially a technology publication, 10 years is a lifetime. Information Security has grown up right alongside the security industry, watching it mature from a niche segment of information technology, to, in many cases, one that has earned a seat on the board of directors. That was unthinkable in 1997 when Web site defacement was the scourge of the day, and compliance, spyware and Windows worms were unheard of. We hope our 10th anniversary issue is a keeper for you, a neat capsule of the past 10 years as seen through the eyes of those who made the information security industry what it is today. Not only will you relive the past 10 years, but we've profiled the landmark events, technology and people who've shaped the industry. We've also asked some of today's brightest minds to take an educated guess at what lies ahead. Enjoy! Do you remember that cold ... Access >>>
Premium Content for Free.
Blow Out the Candles
Information Security magazine turns 10 years old, maturing right alongside the security industry.
Getting the Point | Turning Points | Nefarious Numbers | SOX Appeal | Evolution of a Hacker | Digital Pickpockets | The Toughest Battle: 10 Years, 10 Attacks | We Hardly Knew Ye
A Dynamic Decade | News of the Day | Trustworthy Finally? | Crystal Ball
- Blow Out the Candles
The View from Visionaries | Taking the Services-on-Demand Plunge | Warning Signs | Web of Worry | Attack Toolkits | VoIP Vulnerable
How Sarbanes-Oxley changed the information security profession
Sarbanes-Oxley empowered information security professionals with the clout they'd sought for so long.
More Premium Content Accessible For Free
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...
Despite the enormous concerns around cloud security, many information security professionals remain on the sidelines when it comes to their ...