An acrimonious court case between two athletic gear companies provides strategies for discouraging intellectual property theft—and dealing with accusations when they arise.
Also see:
Image spam—e-mail solicitations that use graphical images of text—is not new. But its rising sophistication has made much of it invisible to spam filters so that it now makes up one-third of all spam.
Recognizing the security profession's best and brightest. This year's theme is business alignment, and surely there is no theme of greater importance to CSOs.
New attacks on the Internet’s domain name system keep CISOs guessing. Here’s what you can do about it.
Metal has never been more valuable, or more stolen. Find out about the metal theft epidemic and CSOs’ struggle to contain the problem.
CSO Research Centers |
|
CSO Resources/Tools |
|
Prevention means staying alert to signals, encouraging employees to report potential problems and practicing response plans. Share these pointers with your HR and management teams.
Too bad, says Bruce Schneier, we don't have separate words for security the mathematical reality and security the psychological feeling, because they are as distinct as air and water. At one time Schneier maligned the psychology of security, what he called security theater to make people feel safe even at the expense of being safe. But, as you'll hear in this podcast, the more he learns about the human brain, the more he's coming around to see value in security theater.
March 18-20, 2007
The Broadmoor
Colorado Springs, Colorado
Join us at CSO Perspectives 2007, where you will have the opportunity to learn from top security executives about the process of building the business case for security.
Call (800) 366-0246 if you have any questions.
Click here for information on speakers, agenda and registration.
sponsored by Citrix
In this Web seminar, you’ll learn the best way to protect your Web applications and achieve PCI compliance, with guidance from renowned application security experts Kurt Roemer and Mark Bouchard. Discover PCI-DSS system requirements, repercussions for noncompliance, how to prepare for new items in v1.1 of PCI-DSS (including Requirement 6.6: application code review or application layer firewall), and how to choose an application layer firewall to comply with PCI-DSS. View now.
sponsored by Sun Microsystems
The merging of cost, compliance, and online commerce as chief business concerns is driving the convergence of provisioning and identity auditing capabilities as well as the demand that such a converged solution be both sustainable and highly scalable. This paper will examine today's business drivers for the convergence of provisioning and identity auditing. Read on to learn more...
You may qualify for a FREE subscription to our print magazine, the Resource for Security Executives
Sponsored Links: