Once a CEO understands the value and risks catered through mobile functionality, it is easier to discuss mobile innovations, policy and how the company can then strike a balance to meet customer and employee requirements.
The information security profession is at a crucial turning point as professionals scramble to develop new skills in the arenas of cloud computing, mobile applications and social media, a new survey shows.
Cyber criminals typically will move on to a target that is much less secure but those behind advanced persistent threats will spend months if not years trying to penetrate an IT system until they succeed, says Dmitri Alperovitch, McAfee Labs threat research vice president.
Dmitri Alperovitch, McAfee Labs threat research vice president, discusses the company's annual threat predictions, saying: "We are seeing an escalating threat landscape in 2011."
The National Institute of Standards and Technology issues NIST Special Publication 800-142: Practical Combinatorial Testing, a method aimed at cutting cost and increasing the effectiveness of software testing for many applications.
In its second report card on the Obama Administration's privacy policies, the Electronic Privacy Information Center points out what it sees as many shortcomings, saving its harshest criticism for the area of civil liberties.
This week's top news and views: Ex-Air Force CIO John Gilligan on the Consensus Audit Guidelines; and Al Berman of DRI International on getting business continuity right.
The level of application security threats is rising, but the level of response is not. "That's a serious disconnect," says Jeff Williams, chair of the OWASP Foundation.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.