Welcome!


Vol: 2 Iss: 3

Read Back Issues

Even in the best of times, security products that aim to thwart worms are playing catch-up. Anti-virus and anti-malware products are populated with signatures created for attack specific signatures, which are created and distributed only after an attack is underway. Internet worms prop...
Based on recent incidents, C-level executives are quickly realizing that in today's increasingly regulated and distributed environments, it's no longer sufficient to rely on status quo barriers of protection for critical corporate information. Instead, security executives are now faced...
For a decade or more, internal and external regulations have impacted corporate IT and shaped the way companies are required to do business. Today you would scarcely find a corporate CIO, IS director, or IT architect who would build or maintain a storage infrastructure without sweating...
IT security professionals who are already managing the bottom-line expectations of their boardrooms while guarding their organizations against myriad security threats have a new 'C-level' challenge - that of compliance. These professionals must now meet voluntary and mandatory regulati...
Over the past several years, a number of factors have conspired to cause the security of information to become a critical business issue that's core to the operation of most companies. These factors include the recent corporate financial scandals, the rise of terrorism, and the increas...
I'm going to make two predictions. One: Every single American will have his identity stolen in the next five years. Two: Some of the management folks who read ISSJ will go to jail in the next five years for poor security practices.
Regulations and audits have become a way of life for many security officers, especially those in the financial and healthcare industries. For example, the Gramm-Leach-Bliley Act (GLBA) requires banks and financial institutions to establish comprehensive security policies to safeguard c...
In businesses throughout Europe and the United States, the segregation of IT security and system operations has become entrenched. Further confounding the rift is the pursuit of all things 'compliance' (e.g., BS7799, ISO 17799, BASEL II, etc.). Industry analysts and vendors alike antic...
In recent years the regulatory pressure on organizations to secure, document, and protect their data and systems has become increasingly difficult to ignore. There appears to be no lack of government regulations - both in the U.S. and abroad - that impose new laws requiring corporate a...
As any IT manager will tell you, ensuring the reliable backup and recovery of centralized data is difficult enough. Add the myriad challenges associated with backing up data from multiple remote locations and the complexity increases exponentially. That's why remote data backup and rec...
We (Patrick and Bruce) are new to ISSJ. In a future article, you'll learn more about who we are and why we are here. In this issue, we thought we would take a minute to frame some of the discussions that will go on throughout the year.