Access "Editor's Desk: The power of one"
This article is part of the April 2006 issue of Security survivor all stars explain their worst data breaches
Oracle will be voted off the island if it doesn't improve its patching process. There's just too much at stake. Fresh off a slew of security conferences, I am hearing one message loud and clear: Vendors are not meeting the needs of the user community. In a room of 300 users at a conference last year, more than two-thirds raised their hand when asked if they agree with the following statement: Vendors give me products I don't need, but the products I have don't deliver what I want. Don't underestimate your power. As security expert Marcus Ranum told attendees last fall at the Information Security Decisions conference, you wield more influence than you may realize. "Somehow, where vendors are concerned, you feel you have to eat what they serve you," Ranum said. "Look at the arguments against using open source. You say you don't use it because there's no one to sue. Well, when was the last time you sued Microsoft when they sold you a piece of crap?" You'll get to hear more of Ranum's opinions in our new Face-Off feature where, every quarter, he'll debate ... Access >>>
Premium Content for Free.
Secure Reads: The Database Hacker's Handbook
Read a review of The Database Hacker's Handbook.
Recent Releases: Security product briefs, April 2006
Read about security products released in April 2006.
BITS & BOLTS SSL-encrypted tunnels protect sensitive data traveling the Information Superhighway.
Security Survivor All-Stars
COVER STORY Five security survivors tell you how to outwit, outplay and outlast the bad guys.
Antispyware / Patch Management
Shavlik Technologies' NetChk Protect 5.5
- Secure Reads: The Database Hacker's Handbook
Security Device Testing
by Steven Weil, Contributor
Karalon's Traffic IQ Pro 1.0
Get a Grip!
MOBILE SECURITY Enterprises need to take control of PDAs, smart phones and other mobile devices to ensure corporate security.
Tumbleweed's MailGate 5500
Hot Pick: F5 Network's FirePass 4100 Controller
F5 Network's FirePass 4100 Controller
- Security Device Testing by Steven Weil, Contributor
Ping: Jane Scott Norris
Jane Scott Norris
Face-Off: Schneier, Ranum debate security awareness training
Is User Education Working?
Editor's Desk: The power of one
Perspectives: Putting out a call for self-defending clients
by M. W. Meyer & Eric Sager, Contributors
Network perimeter defenses have crumbled. What we need now are self-defending clients.
- Ping: Jane Scott Norris
More Premium Content Accessible For Free
FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-ins is real. This guide to secure ...
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...