Access "The bolt-on information security trend needs to end"
This article is part of the October 2012 issue of Security Readers' Choice Awards 2012: Your picks for the best security products
Aren’t you tired of seeing the same headlines recycled in newsprint and magazines and blasting over the airwaves, cable news channels, and Internet? Headlines like “The U.S. is Losing the Information War,” “Cyber Space is the Next Battleground” and “Money Motivates Today’s Hacks”? Articles with these kinds of headlines lay out the plight of the American public, business and government when encountering new vulnerabilities, exploits, credit card frauds, and/or viruses. But are the threats and vulnerabilities truly new? Or are we seeing an ongoing recurrence of the same type of problems because we are not properly addressing security and incorporating long-term solutions into the fabric of our country? Are we, in fact, doomed to repeat history because we do not recognize the pattern and work to avoid the mistakes of the past by continuing to follow the same information security trend? 2013 will mark the 25th anniversary of the Morris worm being released into the Internet and some would argue we are no more secure today than we were then. If we think of the ... Access >>>
Premium Content for Free.
2012 Readers' Choice Awards
For the seventh consecutive year, Information Security readers voted to determine the best security products. More than 2,000 voters participated this year, rating products in 14 different categories.
The hacktivist threat to enterprise security
by Robert Westervelt, News Director
With their goal of damaging corporate reputations, hacktivists aren't your average cybercriminals.
- 2012 Readers' Choice Awards
Threat prevention techniques: Best practices for threat management
by Diana Kelley, Contributor
A successful threat management program requires effective processes, layered technology and user education.
Malware trends: The rise of cross-platform malware
by Moriah Sargent
Security researchers are finding more malware that attacks multiple operating systems.
- Threat prevention techniques: Best practices for threat management by Diana Kelley, Contributor
Big data issues: Big data analytics offers both rewards and risks
by Steve Durbin, Contributor
Companies are under pressure to take advantage of big data analytics but they should be aware of the risks.
The bolt-on information security trend needs to end
by Doug Jacobson and Julie A. Rursch
Unless security is viewed as a core function instead of an add-on, we're bound to repeat the mistakes of the past.
Java security problems: Is disabling Java the answer?
by Marcia Savage
In the wake of recent exploits, experts recommend disabling the programming language but that can be tricky in the enterprise.
- Big data issues: Big data analytics offers both rewards and risks by Steve Durbin, Contributor
More Premium Content Accessible For Free
Despite the enormous concerns around cloud security, many information security professionals remain on the sidelines when it comes to their ...
Not only is modern malware getting more prevalent and sophisticated, it's also now focusing on a broader array of targets. Attackers would still love...
IT Decision Center
Learn how to evaluate your potential vendor's UTM product and its ability to meet your specific business requirements.