- Tools & Templates
- Security Jobs
- Data Protection
- Identity & Access
- Business Continuity
- Physical Security
- Security Leadership
Security Wisdom Watch: Summer FUD Edition!
Thumbs down: Booth babes -- Black Hat and other summer security conferences have been somewhat tarnished in recent years by vendors who use so-called booth babes to attract attention to their exhibits. Let’s hope this year’s exhibits are stalked with smart engineers who can answer questions instead.
Thumbs both ways: Leon Panetta -- The U.S. secretary of defense deserves credit for trying to make Congress more aware of cyber threats. But he should be careful about using the “Digital Pearl Harbor” rhetoric. That’ll just scare our elected officials. And when they’re scared, they often rush through terrible legislation.
Thumbs down: Security PR flacks -- I know PR people are under a lot of pressure to get publicity for their security clients. But sending out emails comparing Stuxnet to the atom bomb over Hiroshima is an irresponsible and foolish way to go about it.
Thumbs up: Mark McLaughlin -- Sadly, we recently learned about the passing of McLaughlin, principal security engineer at RSA, at the young age of 41. He had gained a lot of respect in the industry for his work -- and his gentle nature. Our condolences and best wishes to his friends, family and colleagues.
Thumbs up: Dwight D. Eisenhower -- We recently stumbled upon this quote from the 34th president of the United States and five-star general who planned and supervised the D-Day operation during WW II: “If you want total security, go to prison. There you’re fed, clothed, given medical care and so on. The only thing lacking... is freedom.” It’s a good quote to remember as we debate what should be allowed in the name of cybersecurity.
Thanks to cloud computing, your business data is everywhere and being accessed by everyone. Making the wrong decision to protect your data can result in high costs, increased risk and executive exposure. View this live webinar on cloud security and the evolving data center, and learn why a data-centric approach to security is the best bet for today's virtual environment.
- Redefine Business Portability
- Prevent Mobile Devices from Loading Dangerous Code
- Expanding Your Security Perimeter: Common Sense for Navigating Today's Threat Landscape
- Fighting Fraud Videos: IBM Intelligent Investigation Manager
- IBM Intelligent Investigation Manager: Online Product Demo
- Webinar: IBM IIM for Fraud, Abuse and Waste in Government