Access "A call to action for technology risk management professionals"
This article is part of the October 2013 Vol. 15 / No. 8 issue of Security Readers' Choice Awards 2013
Advanced persistent threats delivering zero days via watering holes have become a reality. Attackers targeting SCADA systems, heart monitors, automobiles and other devices are waiting in the wings. Calls for government to address cybersecurity have reached a fevered pitch. And the breaches continue. As technology invades our lives and Skynet continues to develop with the Internet of Things, the potential downsides are becoming apparent in the "technology risk management" field. How can we be rational and reasonable in our world of downsides? After hearing, once again, that he faced a decision involving tradeoffs, President Truman once famously exclaimed, "Find me a one-armed economist!" in the hope that he would eliminate "the other hand." In reality, even an economist named Bob (get it?) will discuss alternatives and options, because that's what economics is about. Opportunity costs involve all the things we could have done but didn't, once the alternative choice was made. Tradeoffs and scarce resources In the technology risk management field, we are ... Access >>>
Premium Content for Free.
Security Readers' Choice Awards 2013
by SearchSecurity.com Staff
We asked Information Security readers to pick the best security products in 19 categories. Find out which products earned top honors in our 2013 Readers' Choice Awards.
SIEM analytics: Process matters more than products
by Anton Chuvakin
Expect Microsoft Word to write the next great American novel? Success or failure with SIEM products rests on your security monitoring capabilities.
- Security Readers' Choice Awards 2013 by SearchSecurity.com Staff
Beyond the Page, Oct. 2013: Security information and event management
by SearchSecurity.com Staff
In this special report, Gartner's Anton Chuvakin uses SIEM processes to show how security monitoring can make or break a SIEM implementation.
Security: The genesis of SDN
by Sally Johnson, News and Features Writer
SDN is a design with security as its foundation, and it has the potential to solve traditional networking's glaring security issues.
- Beyond the Page, Oct. 2013: Security information and event management by SearchSecurity.com Staff
'Information Security' readers have voted ...
by Kathleen Richards, features editor
We've tallied the votes in our Readers' Choice Awards 2013. Find out the best security products of the year.
A call to action for technology risk management professionals
by Peter Lindstrom
In his inaugural Security Economics column, Peter Lindstrom looks at technology risk management, and how to make the hard decisions pay off.
Security education: Cyber Defense Competitions a major hit on campus
by Doug Jacobson and Julie A. Rursch
Iowa State University recruits industry professionals and hackers to provide students with "real-world" security education.
- 'Information Security' readers have voted ... by Kathleen Richards, features editor
More Premium Content Accessible For Free
Next-generation authentication technologies emerge to restore balance
Cloud and mobility in the enterprise has caused a heightened need for organizations to take a closer look at next generation authentication ...
Virtualization security dynamics get old, changes ahead
Virtualization and cloud computing are part and parcel of enterprise networks today. Virtualization security, however, is still a bolt-on affair ...
Insider edition: Layering mobile security for greater control
Mobile device security is one of the biggest nightmares InfoSec pros face in the era of bring your own everything (BYOE). Simply banning employees ...