Infosecurity TodayPub Date : 2006-11-01DOI: 10.1016/S1742-6847(06)70469-4
{"title":"Microsoft vaunts Vista as chance to clean up IT ‘ecosystem’","authors":"","doi":"10.1016/S1742-6847(06)70469-4","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70469-4","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 6","pages":"Page 5"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70469-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92115793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-11-01DOI: 10.1016/S1742-6847(06)70484-0
Guy Vancollie
{"title":"Data protection as the ‘Third Pillar’ of security","authors":"Guy Vancollie","doi":"10.1016/S1742-6847(06)70484-0","DOIUrl":"10.1016/S1742-6847(06)70484-0","url":null,"abstract":"<div><p>Guy Vancollie explores how a crumbling perimeter and converged networks forces organizations to protect data on their core networks.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 6","pages":"Page 41"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70484-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90189260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-11-01DOI: 10.1016/S1742-6847(06)70476-1
Brian McKenna
{"title":"MBAs don't cut infosec mustard","authors":"Brian McKenna","doi":"10.1016/S1742-6847(06)70476-1","DOIUrl":"10.1016/S1742-6847(06)70476-1","url":null,"abstract":"<div><p>Paul Henry, vice president of strategic accounts at Secure Computing, is one of the world's foremost information security experts, with more than 20 years experience managing security initiatives for Global 2000 enterprises and government organizations. Here he speaks to Brian McKenna, for <em>Infosecurity</em> Today, about a current trend to downplay the technical side of infosec.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 6","pages":"Page 21"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70476-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85354938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-11-01DOI: 10.1016/S1742-6847(06)70473-6
Brian McKenna
{"title":"Wikipedia just as ‘wiki’ as ever, says Wales","authors":"Brian McKenna","doi":"10.1016/S1742-6847(06)70473-6","DOIUrl":"10.1016/S1742-6847(06)70473-6","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 6","pages":"Page 6"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70473-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75924800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-11-01DOI: 10.1016/S1742-6847(06)70472-4
Eleanor Dallaway
{"title":"(ISC)2 joins forces with Childnet in internet safety campaign","authors":"Eleanor Dallaway","doi":"10.1016/S1742-6847(06)70472-4","DOIUrl":"10.1016/S1742-6847(06)70472-4","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 6","pages":"Page 6"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70472-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91129311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-11-01DOI: 10.1016/S1742-6847(06)70474-8
{"title":"What's rollin' round the bend?","authors":"","doi":"10.1016/S1742-6847(06)70474-8","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70474-8","url":null,"abstract":"<div><p>A ‘Council of Ten’ ran the Venetian Republic from 1310 to 1797. Infosecurity Today here presents its own ‘Council of Ten’, but does not envisage the same longevity. We asked ten distinguished infosecurity experts to reflect on 2006 and look ahead to 2007, asking them six questions.</p><p>Our Council of Ten comprises:\u0000</p><ul><li><span>•</span><span><p>Adrian Asher, Global Head of Security, Betfair</p></span></li><li><span>•</span><span><p>Brian Contos, CSO, ArcSight</p></span></li><li><span>•</span><span><p>Leo Cronin, CISO, Reed Elsevier</p></span></li><li><span>•</span><span><p>Bob Gleichauf, VP/CTO, Security Technology Group, Cisco</p></span></li><li><span>•</span><span><p>Paul Henry, VP of strategic accounts, Secure Computing</p></span></li><li><span>•</span><span><p>Evan Kaplan, CEO, Aventail</p></span></li><li><span>•</span><span><p>Tom Noonan, General Manager, IBM Internet Security Systems</p></span></li><li><span>•</span><span><p>Hugh Penri-Williams, Chairman of the Information Security Forum</p></span></li><li><span>•</span><span><p>Paul Simmonds, CSO, ICI</p></span></li><li><span>•</span><span><p>Alex van Someren, CEO nCipher</p></span></li></ul></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 6","pages":"Pages 8-10, 12-14, 16-17"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70474-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92107274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-11-01DOI: 10.1016/S1742-6847(06)70481-5
Cath Everett
{"title":"IBM makes sure it counts in security","authors":"Cath Everett","doi":"10.1016/S1742-6847(06)70481-5","DOIUrl":"10.1016/S1742-6847(06)70481-5","url":null,"abstract":"<div><p>IBM's acquisition of ISS is only one aspect of its anointment of security as a strategic element of its business. Cath Everett analyzes Big Blue's game plan.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 6","pages":"Pages 34-35"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70481-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84488581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-11-01DOI: 10.1016/S1742-6847(06)70488-8
{"title":"Slack space","authors":"","doi":"10.1016/S1742-6847(06)70488-8","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70488-8","url":null,"abstract":"<div><p>Welcome to Slack Space. Our regular column is written by industry insider Slack Alice, whose primary role is to inform, amuse and entertain — and not necessarily in that order…</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 6","pages":"Page 47"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70488-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92005181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}