Access your Pro+ Content below.
How to secure use of Web 2.0
This article is part of the March 2009 issue of Information Security magazine
You don't want to become the Pete Hoekstra of your company. Not that Pete's a bad guy. In fact, Rep. Hoekstra of Michigan has a distinguished legacy of service in politics and business, including a 2004 appointment as chairman of the House Permanent Select Committee on Intelligence, where he is the ranking Republican and still leads oversight on intelligence issues. He's a connected guy. And that's his problem. Early in February, Hoekstra flew into Iraq as part of a Congressional delegation's trip there, and to Afghanistan. Upon his arrival, he posted to his Twitter page that he'd just landed in the Iraqi capital of Baghdad and was stunned he had BlackBerry service for the first time in his 11 trips to Iraq. He later made posts about moving through the "Green Zone" via helicopter to the U.S. Embassy. So much for what was supposed to be a secret trip, and so much for keeping the sanctity of the delegation's itinerary. Hoekstra has close to 3,500 Twitter followers, and theoretically, each one knew of, and could share, his ...
Access this Pro+ Content for Free!
Features in this issue
Smaller organizations need to be more resourceful, and we'll explain how risk management, automation and managed security services, among others, can help.
On-demand computing services can save large enterprises and small businesses a lot of money, but security and regulatory compliance become difficult.
PCI DSS is requiring companies to buy Web application firewalls. We'll show how you how to pick the WAF that's right for you, and how to use it so your company is compliant -- and more secure.
How much information is too much information, and how will you monitor and manage the use of Web 2.0 inside your organization?
The Jericho Forum is expected to release a framework of security considerations for organizations moving business to the cloud.
Columns in this issue
The Obama Administration is conducting a review of the government's cybersecurity policies and process. We should be encouraged that security could move beyond the useless paper exercise it is today
As enterprises outsource more services and share data, they must be vigilant about the security of third parties.
Effective data classification in the enterprise requires a simple approach.