Access "Publisher's Note: Security goals"
This article is part of the July 2005 issue of Why business managers are a breed of security professional
Security pros are wimping out on the hard stuff. What's your No. 1 security goal this year? If I were a betting man, I'd go all in that you'd say, "improving regulatory compliance," "developing security metrics" or some other strategic activity. Well, good thing I know when to fold, because the actual answer is much more tactical: "preventing viruses and worms." According to a new Information Security survey, 93 percent of 430 security pros surveyed said malware defense is a "very important" or "important" goal for 2005. Turns out none of the top three security priorities for 2005 have anything to do with broader security, IT or business strategy. The top priorities are all about the same old ops that have long defined security: controlling malware, including viruses, worms and spyware, and hardening the corporate perimeter against external attacks. Improving compliance is No. 4 on the list, but other strategic activities, like controlling security costs and increasing spending efficiency, are toward the bottom. We also asked security pros to rate how ... Access >>>
Premium Content for Free.
Linux's Best Friend
Thanks to YUM, Linux updates are as reliable as Old Yeller.
Corrent's SR110 SSL VPN Web Security Gateway
by Mike Chapple, Enterprise Compliance
Read about Corrent's SR110 SSL VPN Web Security Gateway with Check Point Connectra 2.0.
Intrusion Detection: Tripwire's Enterprise 5.0
by Scott Sidel, Contributor
June 2005 review of Tripwire's Enterprise 5.0
The Business Case for Network Security: Advocacy, Governance and ROI
Read a review of the book: The Business Case for Network Security: Advocacy, Governance and ROI.
Finding a comprehensive identity and access management architecture requires leadership to navigate the technology and implementation labyrinth.
To gain buy-in and support for your security policies, it's best to start at the top.
- Linux's Best Friend
Hot Pick: NetContinuum's NC-1000 Application Security Gateway 4.3
NetContinuum's NC-1000 Application Security Gateway v4.3
nCircle's IP360 Vulnerability Management System product review
Product review of nCircle's IP360 Vulnerability Management System pricing, setup, configuration, assessment, and installation feature information.
Recent Releases: Security product briefs, July 2005
Read about the security products released in July 2005.
Meet the New Champions
CIGNA makes business managers responsible for security.
Seven ways to leverage your infrastructure against spyware.
- Hot Pick: NetContinuum's NC-1000 Application Security Gateway 4.3
Layer 8: When security is a losing battle
Publisher's Note: Security goals
How important is malware defense in the minds of security professionals? You may be surprised by our 2005 Security Priorities survey.
Ping: Karen Worstell
Perspectives: Lessons learned in BS 7799 certification
Bank of Montreal shares seven lessons learned as it achieved BS 7799 certification.
- Layer 8: When security is a losing battle
More Premium Content Accessible For Free
In this special issue, we are revealing the winners of our Security 7 awards. This is the ninth year we've handed out the Security 7 awards, which ...
Cloud and mobility in the enterprise has caused a heightened need for organizations to take a closer look at next generation authentication ...
Virtualization and cloud computing are part and parcel of enterprise networks today. Virtualization security, however, is still a bolt-on affair ...