Access your Pro+ Content below.
Information security professionals can't waste this opportunity
This article is part of the April 2011 issue of Information Security magazine
If you want to be the next best thing in information security, put aside all those cloud security manuals you're brushing up on. Clear your desk of all those pesky regulations and forget trying to interpret compensating controls and whether they'll fill a compliance checkbox for you. Forget firewall rules, encryption key management, and APT. If you wanna be a rock star, figure out how to bring oversight and direction to your profession. Figure out how to weed through the various and sundry definitions of cybercrime, cyberwar and cyberespionage and stop the confusing juxtapositioning of those three very different notions. Tell us how to reduce the signal-to-noise ration for that trio, and more importantly, clue us in as to who should respond to each, and how. These are indeed interesting times. Things are happening in information security… er, check that, things are becoming public knowledge in information security that indicate a rapid maturation and recognition of the importance of what you do.. We're starting to see what ...
Access this PRO+ Content for Free!
Features in this issue
Application whitelisting was hyped as an antivirus killer. Its real role is serving as an added weapon in the battle against malware.
Security vendors are adding new capabilities into their products to keep up with the surge in malware.
Security incidents are going to happen. Don't get caught flat footed.
Learn what is required for cloud migration, including retooling of network design and security controls such as encryption and DLP.
Columns in this issue
Giving the president power to shut down the Internet would have devastating consequences.
Grab your newfound visibility by the horns and figure out how to bring oversight and direction to cybersecurity.
Marcus Ranum and Gary McGraw discuss software security issues in this new bimonthly feature where Marcus Ranum goes one on one with a fellow security industry insider.