PRO+ Premium Content/Information Security magazine
Access your Pro+ Content below.
Taking action: Understanding the importance of information security

This article is part of the Information Security magazine issue of January 2003
The British have a marvelous word-- "whinging"--which refers to the practice of complaining without doing anything about it. As in, "Everybody whinges about the weather, but nobody does anything about it." We may not all call it by this name, but security practitioners in every country love to "whinge," because it's so much easier to whinge about a problem than try to fix it. Nobody understands how important security is. We never get the budget and respect we deserve. The CIO won't listen to us... Any of this sound familiar? Over the last few years, the volume of infosec whinging has been deafening, thanks in part to the legions of newbies whose expectations don't square with reality. Even after the high-tech meltdown, the vendor space is filled with goofy products developed by technologists who don't know the difference between need and demand. One unintended consequence of this trend is that thousands of bored employees have become convinced that infosec is a really happening place, characterized by astronomical salaries and ...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
Features in this issue
-
Web application security scanners: How effective are they?
How good are Web application scanners at rooting out vulnerabilities? We test two of the leading tools head-to-head to find out.
-
Web-based application infrastructure: Extended connectivity means more risk
Do you know how Web-based application infrastructures are built and used? Learn how in this story.
-
Understanding encryption and cryptography basics
Cryptography doesn't have to be so cryptic. Here's a plain English primer to walk you through the basics.
-
The declining need of accelerator cards
Cheap, more efficient general-purpose chips are reducing the need for accelerator cards.
-
IT security supports increased federal cybersecurity law, survey finds
IT security supports increased federal cybersecurity law, according to an Information Security survey.
-
More cybersecurity laws needed for operational IT security
The U.S. has already adopted several cybersecurity laws, but few affect operational IT security.
-
Information security laws: Are they worth it for your organization?
Who wants the government's help? Who wants to be left alone? Are information security laws worth it for your organization?
Columns in this issue
-
Defining IT security resolutions
Editor-in-chief Andrew Briney offers five IT security resolutions for the New Year that he hopes the industry takes to heart.
-
Examining infosec hackers of the past and how they affect cybersecurity laws
Learn about hackers who have been caught in the past and how it effects IT.
-
Using routers to improve network firewall security
As businesses expose systems to the Internet, it's important to revisit how routers can act as the "suspenders" to the firewall "belt."
-
Taking action: Understanding the importance of information security
The British have a marvelous word, "whinging"--the practice of complaining without doing anything about it. Security practitioners love to "whinge."