Access "Editor's Desk: Apathy and the Cybersecurity Coordinator"
This article is part of the December 2009 issue of Step-by-step guide to avoiding basic database security risks
All I want for Christmas is a cybersecurity coordinator. No, not really. (I'd rather have a PS3). See, now that we're about to turn the page on 2009, and almost seven months have passed since President Obama declared cyberspace a strategic national asset and promised to put someone in charge of cybersecurity, we still don't have anyone on the job. And I don't care anymore. I don't care if Howard Schmidt gets the job -- again. I don't care if it's Paul Kurtz, Bruce Schneier or some obscure senator from Montana. See, I don't care. It's evident that these were hollow words from the president's mouth. It's evident the country's cybersecurity capabilities are best left to individual agencies and providers of critical infrastructure in the private sector. It's evident we don't need another bureaucrat telling us to update our antivirus and install a personal firewall on our PCs. Yawn. Give Melissa Hathaway her due; she knew when to get out of Dodge. Long thought to be a front-runner for the job, Hathaway bolted fast and furious in August. Hathaway, who oversaw the ... Access >>>
Premium Content for Free.
Is New Google Chromium OS a Security Game-Changer?
Google says Chromium's process isolation and sandbox security features harden the OS from attack.
Carefully evaluate providers' SaaS security model
Enterprises need to make sure a SaaS provider has the proper security controls to protect sensitive data before a contract is signed
- Is New Google Chromium OS a Security Game-Changer?
Basic Database Security: Step by Step
by Adrian Lane, Contributor
Use this checklist to ensure you're following the basics for securing database systems.
Writing security policies using a taxonomy-based approach
by Ravila Helen White
Forget structure-driven policy architecture; we'll show you how to build information security policy artifacts using a taxonomy approach that will help you build global policies in a snap.
- Basic Database Security: Step by Step by Adrian Lane, Contributor
Is HITECH Destined to be a Cybercrime Stimulus Act?
The HITECH Act, part of the economic stimulus bill, is intended to foster electronic medical records systems adoption, but will also introduce security and privacy risks to patient medical and billing data.
Editor's Desk: Apathy and the Cybersecurity Coordinator
Six months since President Obama announced he would appoint a cybersecurity coordinator, the position sits vacant. Do you care?
- Is HITECH Destined to be a Cybercrime Stimulus Act?
More Premium Content Accessible For Free
For many security teams, "continuous monitoring" is a vague concept associated with FISMA compliance. A continuous monitoring program can be simple ...
The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...
Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...