Access "Editor's Desk: 'Motivation by embarrassment'"
This article is part of the March 2005 issue of What are botnets and how can you prepare for them?
As a kid, I hated report cards. I wasn't a good high school student for all the obvious reasons--it was the '80s. I didn't take my studies seriously until college. I was paying tuition myself, and, since the money was coming out of my pocket, I figured that I'd better hit the books. Graduating cum laude validated my effort. In the corporate world, grades take the form of performance numbers. No division EVP or department manager wants to face PowerPoint slides showing them at the bottom of the revenue pack. Perform well, your career skyrockets; perform poorly, and your career flounders. Even if senior executives don't keep score, managers use performance numbers to benchmark themselves against their peers, set goals, devise plans and advance by showing improvements in their grade. And this is precisely what happened when Preston Wood, CISO at Zions Bancorporation, started publishing department vulnerability scans and remediation times. Security, network and department managers raced to understand the numbers and what it would take to improve them. Security ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Recent Releases: Security product briefs, March 2005
Read about security products that were released in March 2005.
-
Guardians of the Crown Jewels
Database security products promise an extra measure of security for your most valuable assets. Are they worth the price?
-
Secure Reads: Outsourcing Information Security
Read a review of the book, Outsourcing Information Security.
-
Crypto Hazard
Could cryptography be the next destructive malware payload?
-
Double-Check with Routers
Conventional routers are the perfect network security auditing device. Take advantage of what they see.
-
Wireless Firewall
AirMagnet Enterprise 5.0
-
Recent Releases: Security product briefs, March 2005
-
- Invasion Force
-
BARRIER1 Model 50 product review
Product review of Barrier1 Model 50 open source security appliances cost, reporting and Web content and email filtering features.
-
Hot Pick: Enterasys's Dynamic Intrusion Response
Dynamic Intrusion Response
-
Vulnerability management: Visionael Enterprise Security Protector 3.0
Visionael Enterprise Security Protector 3.0
-
Configuration Management: St. Bernard Software's SecurityEXPERT 1.0
SecurityEXPERT 1.0
-
Columns
-
Perspectives: Tearing down Firewalls
Firewalls do little more than inhibit your business, writes Paul Simmonds of the Jericho Forum.
-
Layer 8: Finding a template for good information security
Security by Numbers
-
Logoff: Why Microsoft keeps infosec in business
The Wal-Mart of Security
-
Editor's Desk: 'Motivation by embarrassment'
Making the Grade
-
Perspectives: Tearing down Firewalls
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO