close
The Wayback Machine - https://web.archive.org/web/20071230111810/http://www.csoonline.com:80/

The Worst Privacy Quotes of the Year

The Worst Privacy Quotes of the Year

From massive data breaches to insidious new ways to deliver ads online, there were so many privacy lowlights in 2007 that CSO has introduced a new award--the Privvy Awards, for outstanding quotability regarding privacy. Get ready to cringe.

 

 


Security Blogs

Security In the (Apple) Core

The Grinch that Stole Security

Lohrmann On GovSpace

Get Ready California: Teri Takai is Coming to Town

Digital ID World

Oracle Posts Some Big Numbers

Security Blanket

British Olympic Teams Hit by Hackers?

Security Renegades

Have we all become "Patch Crazy?"

Movers and Shakers

Recent Moves: PricewaterhouseCoopers, Netrics

 

Editor's Picks

Careers

Career Advisor: The Most-Wanted Security Skills of 2007 (and Beyond)

An information security recruiter reports that risk management, threat modeling and metrics expertise are in high demand.

Full story »

Job Hunting

5 Steps for Surviving the Job Search Doldrums

It�s a slow time of the year for job seekers. Security recruiters offer advice on using the down time to put your job search in shape for next year.

Full story »

Retrospective

The Top 10 Data Breaches of 2007

Stolen hard drives, websites infected with malware and Social Security numbers as passwords—the most brilliant lunacy of a year full of security disclosures.

Full story »

E-Commerce

5 Reasons It's Riskier to Shop In Person Than Online

Shopping online may not be inherently safer than going to the mall, but at least you have a little more control.

Full story »

Online Safety

Security Researcher Promotes Concept of 'Safe' and 'Promiscuous' Web Browsers

A quick tip for keeping yourself safe online—if you don�t mind extreme web browsing.

Full story »

Opinion

The Dark Ages of Identity Management

William the Conqueror as identity management pioneer? Absolutely, says Jason Cowling. In fact, we haven�t made much progress since.

Full story »

Application Security

Is the Backdoor Threat the Next Big Threat to Applications?

Security researcher Chris Wysopal talks about the misunderstood vulnerability of backdoors, what he�s doing to formalize understanding of them, and what his research tells him about the security of open source versus proprietary applications.

Full story »

Security News

Alarmed
The Real Barrier to Security: We're All Too Lazy

What if someone offered you a free 60-inch plasma TV and free cable for life--provided you never again used a remote control? The reason you�d say no, says columnist Scott Berinato, is the same reason information security is so bad.
More>>

 

CSO Compass Award, CSO NEXT Award

We are now accepting nominations for the 2008 CSO Compass Awards, for established security leaders, and the new CSO NEXT Award, for the next generation of security leaders. Please take the time to recognize someone you know who�s doing outstanding work in the security field.

Learn more.

Aberdeen Security Research

CSO, in conjunction with analyst firm Aberdeen, brings you the latest security research.

Read the Reports

Assessment Tool: How Flawed Is Your Security Program?

Is Your Security Program Flawed?

Roger Johnston, leader of the Vulnerability Assessment Team at Los Alamos National Labs, developed this quiz that identifies the 28 attributes of a flawed security system. Find out how you rate with this interactive assessment tool.

Check out all our interactive tools:

Spying Scandal at Hewlett-Packard

CSO the magazine

You may qualify for a FREE subscription to our print magazine, the Resource for Security Executives

WHITE PAPER

Access a single interface for solving your common security problems.

The logical answer to keeping your network and systems secure is to prevent unhealthy or unauthorized users on the network in the first place. This requires a layered security solution, including network access control with LANDesk Trusted Access technology.

WEBCAST

Customer Perspectives: IT Security as a Business Enabler

View this on-demand roundtable and you�ll gain insight from the security officers of The McGraw-Hill Companies, Citizen�s Financial Group and Intuit, Inc.

WHITE PAPER

Removing the Barriers of Traditional FTP to Facilitate Secure File Transfers

Today, more and more criminals are turning their attention to file transfers that carry consumer identifying data. Many organizations move this information with file transfer protocol (FTP), and these servers are proving to be easy targets for thieves. Encryption may seem like an easy fix, but there is no easy answer to this complicated problem.



 

 
Endpoint Security Virtual Conference

Register today for this free virtual conference and receive our exclusive Endpoint Security Survey to benchmark your efforts against those of your peers.

Learn more »


advertisement