Infosecurity Today最新文献

筛选
英文 中文
Microsoft vaunts Vista as chance to clean up IT ‘ecosystem’ 微软吹嘘Vista是清理IT“生态系统”的机会
Infosecurity Today Pub Date : 2006-11-01 DOI: 10.1016/S1742-6847(06)70469-4
{"title":"Microsoft vaunts Vista as chance to clean up IT ‘ecosystem’","authors":"","doi":"10.1016/S1742-6847(06)70469-4","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70469-4","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 6","pages":"Page 5"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70469-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92115793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data protection as the ‘Third Pillar’ of security 数据保护是安全的“第三大支柱”
Infosecurity Today Pub Date : 2006-11-01 DOI: 10.1016/S1742-6847(06)70484-0
Guy Vancollie
{"title":"Data protection as the ‘Third Pillar’ of security","authors":"Guy Vancollie","doi":"10.1016/S1742-6847(06)70484-0","DOIUrl":"10.1016/S1742-6847(06)70484-0","url":null,"abstract":"<div><p>Guy Vancollie explores how a crumbling perimeter and converged networks forces organizations to protect data on their core networks.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 6","pages":"Page 41"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70484-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90189260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MBAs don't cut infosec mustard mba不符合信息安全标准
Infosecurity Today Pub Date : 2006-11-01 DOI: 10.1016/S1742-6847(06)70476-1
Brian McKenna
{"title":"MBAs don't cut infosec mustard","authors":"Brian McKenna","doi":"10.1016/S1742-6847(06)70476-1","DOIUrl":"10.1016/S1742-6847(06)70476-1","url":null,"abstract":"<div><p>Paul Henry, vice president of strategic accounts at Secure Computing, is one of the world's foremost information security experts, with more than 20 years experience managing security initiatives for Global 2000 enterprises and government organizations. Here he speaks to Brian McKenna, for <em>Infosecurity</em> Today, about a current trend to downplay the technical side of infosec.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 6","pages":"Page 21"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70476-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85354938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compliance and strategy 遵从性和策略
Infosecurity Today Pub Date : 2006-11-01 DOI: 10.1016/S1742-6847(06)70466-9
Brian McKenna (Editor)
{"title":"Compliance and strategy","authors":"Brian McKenna (Editor)","doi":"10.1016/S1742-6847(06)70466-9","DOIUrl":"10.1016/S1742-6847(06)70466-9","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 6","pages":"Page 3"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70466-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84846297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wikipedia just as ‘wiki’ as ever, says Wales 威尔士说,维基百科还是一如既往的“维基”
Infosecurity Today Pub Date : 2006-11-01 DOI: 10.1016/S1742-6847(06)70473-6
Brian McKenna
{"title":"Wikipedia just as ‘wiki’ as ever, says Wales","authors":"Brian McKenna","doi":"10.1016/S1742-6847(06)70473-6","DOIUrl":"10.1016/S1742-6847(06)70473-6","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 6","pages":"Page 6"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70473-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75924800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
(ISC)2 joins forces with Childnet in internet safety campaign (ISC)2与儿童网联手开展互联网安全运动
Infosecurity Today Pub Date : 2006-11-01 DOI: 10.1016/S1742-6847(06)70472-4
Eleanor Dallaway
{"title":"(ISC)2 joins forces with Childnet in internet safety campaign","authors":"Eleanor Dallaway","doi":"10.1016/S1742-6847(06)70472-4","DOIUrl":"10.1016/S1742-6847(06)70472-4","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 6","pages":"Page 6"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70472-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91129311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What's rollin' round the bend? 什么在转弯?
Infosecurity Today Pub Date : 2006-11-01 DOI: 10.1016/S1742-6847(06)70474-8
{"title":"What's rollin' round the bend?","authors":"","doi":"10.1016/S1742-6847(06)70474-8","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70474-8","url":null,"abstract":"<div><p>A ‘Council of Ten’ ran the Venetian Republic from 1310 to 1797. Infosecurity Today here presents its own ‘Council of Ten’, but does not envisage the same longevity. We asked ten distinguished infosecurity experts to reflect on 2006 and look ahead to 2007, asking them six questions.</p><p>Our Council of Ten comprises:\u0000</p><ul><li><span>•</span><span><p>Adrian Asher, Global Head of Security, Betfair</p></span></li><li><span>•</span><span><p>Brian Contos, CSO, ArcSight</p></span></li><li><span>•</span><span><p>Leo Cronin, CISO, Reed Elsevier</p></span></li><li><span>•</span><span><p>Bob Gleichauf, VP/CTO, Security Technology Group, Cisco</p></span></li><li><span>•</span><span><p>Paul Henry, VP of strategic accounts, Secure Computing</p></span></li><li><span>•</span><span><p>Evan Kaplan, CEO, Aventail</p></span></li><li><span>•</span><span><p>Tom Noonan, General Manager, IBM Internet Security Systems</p></span></li><li><span>•</span><span><p>Hugh Penri-Williams, Chairman of the Information Security Forum</p></span></li><li><span>•</span><span><p>Paul Simmonds, CSO, ICI</p></span></li><li><span>•</span><span><p>Alex van Someren, CEO nCipher</p></span></li></ul></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 6","pages":"Pages 8-10, 12-14, 16-17"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70474-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92107274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IBM makes sure it counts in security IBM确保自己在安全方面举足轻重
Infosecurity Today Pub Date : 2006-11-01 DOI: 10.1016/S1742-6847(06)70481-5
Cath Everett
{"title":"IBM makes sure it counts in security","authors":"Cath Everett","doi":"10.1016/S1742-6847(06)70481-5","DOIUrl":"10.1016/S1742-6847(06)70481-5","url":null,"abstract":"<div><p>IBM's acquisition of ISS is only one aspect of its anointment of security as a strategic element of its business. Cath Everett analyzes Big Blue's game plan.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 6","pages":"Pages 34-35"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70481-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84488581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Senior infosec pros shift gears from technology to management 高级信息安全专家从技术转向管理
Infosecurity Today Pub Date : 2006-11-01 DOI: 10.1016/S1742-6847(06)70468-2
Brian McKenna
{"title":"Senior infosec pros shift gears from technology to management","authors":"Brian McKenna","doi":"10.1016/S1742-6847(06)70468-2","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70468-2","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 6","pages":"Page 4"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70468-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136846477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Slack space 松弛的空间
Infosecurity Today Pub Date : 2006-11-01 DOI: 10.1016/S1742-6847(06)70488-8
{"title":"Slack space","authors":"","doi":"10.1016/S1742-6847(06)70488-8","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70488-8","url":null,"abstract":"<div><p>Welcome to Slack Space. Our regular column is written by industry insider Slack Alice, whose primary role is to inform, amuse and entertain — and not necessarily in that order…</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 6","pages":"Page 47"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70488-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92005181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信