The evolution of IT security requires human ingenuity. Machines are fast but dumb, yet using human brainpower can help reject quickly harmful traffic aimed to damage critical IT systems, says Phyllis Schneck, McAfee CTO/public sector.
The possibility grows that hackers could take away control of the car from drivers as more automakers provide vehicle-to-vehicle and vehicle-to-infrastructure communications networks to third-party development.
"The effort with which an organization can recognize, analyze and respond to an incident will limit the damage and lower the cost of recovery," says Don Weber, former incident response professional at IBM.
This week's top news and views: The impact of the midterm elections on cybersecurity in Congress, White House issues secure cloud computing guidance and an IBM CTO speaks out on government cloud computing.
To get ahead, especially for managers, infosec pros must know about education, governance, intellectual property, law, policy, privacy and strategy, says Harry Raduege, co-chair of an influential panel on cybersecurity.
House GOP members, including Texan Mike McCaul (pictured), are set to gain influence on IT security matters as they're poised to take over the chairmanships of key committees with cybersecurity oversight.