From massive data breaches to insidious new ways to deliver ads online, there were so many privacy lowlights in 2007 that CSO has introduced a new award--the Privvy Awards, for outstanding quotability regarding privacy. Get ready to cringe.
An information security recruiter reports that risk management, threat modeling and metrics expertise are in high demand.
It�s a slow time of the year for job seekers. Security recruiters offer advice on using the down time to put your job search in shape for next year.
Stolen hard drives, websites infected with malware and Social Security numbers as passwords—the most brilliant lunacy of a year full of security disclosures.
Shopping online may not be inherently safer than going to the mall, but at least you have a little more control.
A quick tip for keeping yourself safe online—if you don�t mind extreme web browsing.
William the Conqueror as identity management pioneer? Absolutely, says Jason Cowling. In fact, we haven�t made much progress since.
Security researcher Chris Wysopal talks about the misunderstood vulnerability of backdoors, what he�s doing to formalize understanding of them, and what his research tells him about the security of open source versus proprietary applications.
What if someone offered you a free 60-inch plasma TV and free cable for life--provided you never again used a remote control? The reason you�d say no, says columnist Scott Berinato, is the same reason information security is so bad.
More>>
We are now accepting nominations for the 2008 CSO Compass Awards, for established security leaders, and the new CSO NEXT Award, for the next generation of security leaders. Please take the time to recognize someone you know who�s doing outstanding work in the security field.
CSO, in conjunction with analyst firm Aberdeen, brings you the latest security research.
Roger Johnston, leader of the Vulnerability Assessment Team at Los Alamos National Labs, developed this quiz that identifies the 28 attributes of a flawed security system. Find out how you rate with this interactive assessment tool.
Check out all our interactive tools:
You may qualify for a FREE subscription to our print magazine, the Resource for Security Executives
The logical answer to keeping your network and systems secure is to prevent unhealthy or unauthorized users on the network in the first place. This requires a layered security solution, including network access control with LANDesk Trusted Access technology.
View this on-demand roundtable and you�ll gain insight from the security officers of The McGraw-Hill Companies, Citizen�s Financial Group and Intuit, Inc.
Today, more and more criminals are turning their attention to file transfers that carry consumer identifying data. Many organizations move this information with file transfer protocol (FTP), and these servers are proving to be easy targets for thieves. Encryption may seem like an easy fix, but there is no easy answer to this complicated problem.
Sponsored Links:

Register today for this free virtual conference and receive our exclusive Endpoint Security Survey to benchmark your efforts against those of your peers.
advertisement