Welcome!


Vol. 3 Iss: 1

Read Back Issues

Fourteen years ago I warned MyBank (who is not one of my clients, I am one of theirs) about using social security numbers as solid identification. The Head of Security, three weeks retired from the Secret Service, said he would look into it. Nothing has changed except the security at M...
Enterprises and government agencies are using smart card-based credentials more and more. Organizations around the globe are striving to protect corporate information assets, address regulatory compliance pressures, and achieve cost savings and increased security through the convergenc...
Criminal gangs are increasingly using the Internet to extort money from businesses. Thousands of Distributed Denial of Service attacks occur globally every day and it' vital that senior management wakes up to the very real risk of such an assault. The rise of the Internet has carried a...
Every business owner knows that information is much more than one of an organization's strategic resources. In a very real sense, information is the organization. For IT professionals, there's no shortage of challenges when it comes to protecting and managing such a vital asset efficie...
It's often said that IT administrators in general, and storage administrators in particular, are highly risk-averse. Clearly that's the case today. Look for a moment at any one of the surveys that seeks to understand the most pressing issues on the minds of those are tasked with the st...
Successful businesses execute simultaneously on three fronts: sustained revenue growth, continuous cost control, and comprehensive risk management. Driven by a significant rise in public awareness of information security breaches, the discipline of risk management is under increased pr...
Information security assurance is a topic that has developed quickly over the last few years. Drivers for its rapid development include the development of computers at the pace of Moore's Law during the information revolution of the last century. Motivation for interest in the topic st...
Over the last 15 years, the Internet has revolutionized legitimate business communications supplanting the venerable fax machine and creating its own marketing infrastructure. Nowhere is that revolution more prevalent than in the wide acceptance of e-mail as a way to maintain communica...
Ever since the introduction of Open Systems into the data center, a problem has been brewing. Too often, the storage environment isn't seen as an area with security considerations. Until recently, corporate security policies rarely considered the data center storage environment; someti...
Storage is still one of the most costly and fastest-growing aspects of everyone's network and is likely to remain so for some time. Every network user is a storage user. We're all part of a community that shares the costs and the benefits of this expensive resource. Storage management ...
ChoicePoint, CardSystems, LexIsNexIs, Polo Ralph Lauren. The headlines in 2005 were littered with cases of high-profile security breaches and customers, partners, and government are increasingly holding businesses accountable for the security of their applications. Poor application sec...