www.fgks.org   »   [go: up one dir, main page]

Opinions

Ten years of evolving threats: A look back at the impact of notable malicious wares of the past decade
Opinions

Ten years of evolving threats: A look back at the impact of notable malicious wares of the past decade

Derek Manky, project manager, Fortinet Fortiguard Labs November 15, 2010

As security firm Fortinet celebrates 10 years in business, Fortiguard Labs took a look at the 10 most intriguing threats during the past decade and showed how their feature sets have evolved, Darwin-like, over time.
Opinions

Eight questions CIOs should ask on cloud security

Lucius Lobo, director of security consulting, Tech Mahindra November 12, 2010

As more organizations continue migrating to the cloud, what should information leaders at organizations be asking of their provider?
 
Opinions

Five ways to enjoy your Apple and keep your corporate network squeaky clean

Patrick Sweeney, vice president of product management, SonicWALL November 05, 2010

As Apple devices gain more traction in the office, IT administrators must follow best practices to ensure these endpoints can be trusted.
 
Opinions

Defense in depth: building a holistic security infrastructure

Carl Herberger, vice president of information security and compliance services, Evolve IP November 02, 2010

Organizations must consider security at the network, application, host and data layers to most effectively protect against threats.
 
Editorial

Fending off cyberwar attacks

Illena Armstrong November 01, 2010

Chicken Little could relate to the likely thoughts of all those cybersecurity players who have warned time-and-again that it isn't a matter of 'if' cyberwar would occur but 'when.'
 
Features

Wearing your PJs to work

Jamie Sanbower, director of security solutions, Force 3 November 01, 2010

While teleworking improves overall productivity and morale, from a security pro's perspective, the worry of trading security and visibility for productivity is a nightmare.
 
Opinions

Designing secure software and services now will save money later

Ryan Berg, senior security architect, IBM October 27, 2010

The cost of fixing a vulnerability after a product already has gone to market is much higher than the cost of finding it during the design process.
 
Opinions

Data protection and controls: Does format really matter?

Andres Tabares, CISSP October 22, 2010

Organizations must consider the entire lifecycle of data, even when in hardcopy form, when implementing a security strategy.
 
Home

A brief history of security innovation: Where do we go from here?

Elad Yoran, CEO and founder, Security Growth Partners October 20, 2010

Another era of security innovation is upon us, but first we must clear some barriers that could deter a new wave of imagination.
 
Home

Volunteers seek out public/private partnerships

Kathleen Kiernan, chair, InfraGard National Members Alliance October 20, 2010

Building trust between the public and private sectors can be a challenge.