Access "Editor's Desk: Security for the corporate brand"
This article is part of the December 2005 issue of Top forensics tools for tracking down cybercriminals
Know Thy Business At the top of the infosecurity profession, an MBA may trump the CISSP. It's now all about protecting corporate image, not just networks. You entered IT security because you love the technology, right? Coding at 13 and perhaps an innocent hack at 14? Graduating from school, you landed a job where you actually got paid to do what you loved. And you got really good at it. So good, you climbed that corporate ladder. Only now, that dream job has but all vanished as you move farther away from what made you enter this market in the first place. Today, your job is less about bits and bytes and more about business. Coding? Adios. Finding bugs and vulnerabilities? Au revoir. Suddenly, you're the brand guy, the compliance go-to and, of course, the security guru. You're protect- ing the company's crown jewels, fighting incidents to protect the brand and adhering to the endless regulations so your CEO won't go to the Big House. Now's the time to gain the power and influence you deserve. If you don't earn your seat at the table, your company's assets ... Access >>>
Premium Content for Free.
Building A Perimeter Defense With Application-Level Firewalls
Learn how application level firewalls, when carefully deployed, can build perimeter defenses and prevent hackers from exploiting vulnerabilities, such as application code, to achieve attacks.
To Catch a Thief
Forensics tools aren't only used in high-profile cases.
On the Mend
Health care giant Novartis AG got a much-needed shot in the arm with a comprehensive risk assessment and revamped security management system.
Recent Releases: Security product briefs, December 2005
Learn about the security products released in December 2005.
Controlling the Uncontrollable
Organizations must leverage policy, and harness new protocols and technology to tame wild WLANs.
Information Security's 2006 Priorities Survey signals a transition for security managers from an operational to a more strategic stance.
- Building A Perimeter Defense With Application-Level Firewalls
Hot Pick: Citrix Systems' Citrix Access Essentials
Citrix Systems' Citrix Access Essentials
SSL VPN: Array Networks' Array SPX5000
A review of Array Networks' Array SPX5000
Configuration Management: Configuresoft's Enterprise Configuration Manager v4.7
Configuresoft's ECM v4.7
Application Security: Cenzic's Hailstorm v2.6
Cenzic's Hailstorm v2.6
Secure Reads: Mergers and Acquisitions Security
Read a review of the security book Mergers and Acquisitions Security.
- Hot Pick: Citrix Systems' Citrix Access Essentials
On The Radar: Security technology can't solve process problems
Perspectives: History teaches security lessons well
Expert Richard Bejtlich looks at the lessons learned in engineering disasters and applies them to information security.
Editor's Desk: Security for the corporate brand
Know Thy Business
Ping: Desiree Beck
- On The Radar: Security technology can't solve process problems
More Premium Content Accessible For Free
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...
In the rush to capitalize on big data, many companies forget that developing an ecosystem of structured and unstructured data means higher risk of ...
As the number of Internet-connected devices grows, the potential security challenges of the so-called "Internet of Things," or IoT, can no longer be ...