Access "Profile: Symantec CEO John Thompson"
On the eve of John W. Thompson's arrival at Symantec in April 1999, the Rev. Jesse Jackson came to Silicon Valley to complain about the dearth of minority leaders in IT. No one was more dismayed at the timing than the Northern California company's new chief executive. Granted, Thompson also encouraged fellow African-Americans to consider IT careers. But, as he correctly predicted, the news media seized on the coincidence. "John very much wanted to be accepted into this new position as the best choice, which he absolutely was. But because of Jesse Jackson being there, half the stories focused on the racial aspect of the appointment," recalls R.S. "Steve" Miller, CEO of Bethlehem Steel and the Symantec board member who recruited Thompson. Thompson still generates a lot of press, but these days it's because of the direction he's steering his company--one that defies conventional wisdom and, for the moment, appears to be working. Full Name: John Wendell Thompson Age: 53 Education: B.A., business administration, Florida A&M University; M.S., management science, ... Access >>>
Premium Content for Free.
Microsoft security improving, while Trustworthy security lacks effort
by Lawrence M. Walsh
Microsoft is making significant strides to clean up its security mess, but Trustworthy Computing still has a long way to go.
Microsoft's internal auditor discusses the company's IT security outlook
Scott Charney is Microsoft's internal auditor, see what he and his team control.
NetIQ's five-point security architecture
Even with expanded support and agents, NetIQ's SIM product remains a Windows-centric solution.
- Microsoft security improving, while Trustworthy security lacks effort by Lawrence M. Walsh
Microsoft Security Response Center revamps its patch processes
Microsoft Security Response Center revamps its advisory and patch processes.
Profile: Symantec CEO John Thompson
Symantec's CEO breaks business and cultural barriers in his drive to build a security superpower.
How to address enterprise IT security concerns with executives
Five tips to win friends and influence C-level execs in your organization.
- Microsoft Security Response Center revamps its patch processes
Next-generation security awareness training
by Andrew Briney
Put your posters and buttons away. A more effective solution is at your fingertips.
Hacking in 2003: Examining this year's hacking techniques
A look at the foibles, follies and felons of infosec in 2003.
Using HoneyD configurations to build honeypot systems
by Marcus J. Ranum, Contributor
Spoofing, diversion and obfuscation are all part of honeyd's powerful arsenal.
Detecting a Linux server hack
by Jay Beale, Contributor
Learn how to detect if your Linux server have been hacked or compromised.
Tips and tricks for IDS deployment best practices
by Jack Danahy, Contributor
Intrusion detection remains an over-hyped technology because most companies have no idea what to do with it.
- Next-generation security awareness training by Andrew Briney
More Premium Content Accessible For Free
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...
In the rush to capitalize on big data, many companies forget that developing an ecosystem of structured and unstructured data means higher risk of ...
As the number of Internet-connected devices grows, the potential security challenges of the so-called "Internet of Things," or IoT, can no longer be ...