Tuesday's News Stories UPDATE: ** The FTC said Tuesday that it had won a court order to shut down x-rated spammers, reports the Associated Press. ** President Bush selects his new Homeland Security nominee, federal appeals court judge Michael Chertoff, reports the Associated Press. Insurgents kill at least 13 more Iraqis in new attacks, according to The New York Times. Federal officials tell Washington D.C. it must cover more than $17 million in security costs associated with the inauguration, reports the Washington Post.
ANALYST REPORT Wireless E-Mail: An Overview
Gartner identifies several requirements for efficient and secure enterprise deployment of wireless e-mail.
What Are Your Security Resolutions for 2005?
Did you make any New Year's resolutions for your organization? Share them with us. If you haven't,
we're happy to suggest a few.
The Offshore Sniff Test
When it comes to offshore outsourcing, the real privacy problem is what companies are keeping secret
Security executive positions from around the world. Including:
CSO Wanted accepts postings for senior security positions at no charge.
CSO Career Adviser
Looking for security executive career advice? Our resident experts, Joyce Brocaglia and Pete Metzger, answer your questions about certification, getting started and more. This week a reader asks: "Is security engineering a wrong turn?" SECURITY COUNSEL
John Kingsley-Hefty has been involved in security design for more than 28 years. He worked in 3Mís Corporate Security Services department as a consulting architect, specializing in security design for 3Mís facilities worldwide. In 1997, he formed Secure Environments, which helps clients design better security and integrated business solutions. He is available now to answer your questions about video surveillance and the technology options that may be right for your business.
A Good Worm Is Hard to Find
Are "benevolent" worms the best solution to the patching problem? This CTO doesn't think so.
Movers and Shakers
DHS CSO Resigns for Consulting Post; Tacoda names Pinney CPO; Golden Telecom names Wallace CRO; and more.
CSO Magazine and CERT Security Capability Assessment Tool
Are your security practices repeatable, documented, and regularly reviewed and updated? Test your security strategy and policies. Results of the overall Security Capability Assessment Tool findings will be available at CSOonline.com later this year.
Safety in Numbers
Antispyware Revenues to Climb
Our collection of security-related events from around the world. Some of the listed events: Post
security-related events at no charge.
Security A to Z
Learn the lingo of the security industry by visiting our new online glossary. From "abuse of privilege" to "white hat hacker," we've got it covered. In-depth information on critical topics:
· Russian Roulette
· Reality TV
· A Long Way to Grow
· Securing the Post-Human Future
· And Much More...
FROM THE EDITOR
Men Behaving Badly
The big talk recently in the world of sports concerned the player-fan basketball melee in Detroit.
Hacker Alexey Ivanov was lured to the United States and snared in a high-stakes cyber-sting. The FBI says he got what he deserved. But Ivanov says his gamble paid off. In the end, he got what he wanted all along.
The reasons to invest in new video surveillance systems are everywhere. Zoom in on these six insights to help you focus on what's important and what's just hype.
A Long Way to Grow
First results from a new security management survey indicate that many companies have only rudimentary practices in place
THE LONG VIEW
Securing the Post-Human Future
CSOs will very likely live to see the day when human brains are easily augmentable through an array of knowledge implants, apps and Wi-Fi capabilities. If securing an enterprise seems tricky today, imagine installing firewalls in a few thousand employees' prefrontal lobes.
· The Electronic Road to the White House
· Ridge's Successor Can Beef Up Public-Private Ties
· Employers Fight Oklahoma Gun Law
· The Security Blotter
· Bug Vendors
Judith Collins is an associate professor at the School of Criminal Justice at Michigan State University. She answers readers' questions about securing customers' and employees' personal information.
Why Convergence Is Elusive
Last month, CSO's editor asked why CSOs can't all just get along in a world of converged security management. The problem is that we've got to raise our profiles in the corporate world first.
Challenges In and Out
As DHS struggles to find a permanent cybersecurity chief, its CIO and CISO are grappling with challenges of their own
Beyond Passport Vulnerabilities
Security flaws in high-profile products like Microsoft's Passport led experts and vendors to find new ways to disclose bugs
Putting Out Fires
It wasn't your typical vendor meeting, reports a CSO colleague of mine.
Great Moments in Vulnerability Disclosure READ THE ENTIRE JANUARY ISSUE
Balancing the Art & Science of Security
April 10 - 12, 2005
Hyatt Regency Huntington Beach, CA
The CSO Perspectives Conference will examine the complex balancing act between the art and science of security by looking at what the top practitioners are thinking and doing, and by listening to what leading security and privacy experts think will affect the landscape of the future. Learn More.
Compare and select the best security vendor for your needs. If you have products to sell, use this service to put your company in front of the thousands of corporate management and security professionals with real buying power, who come to CSO every day. Visit the
. CSO Buyer's Guide
MessageLabs Email Security for Enterprise: New WP
Anti-Spyware: Securing the Corporate Network
The Need for Patch Management
CSO Focus: Content Filtering All CSO White Papers...
2003 IT SECURITY ASSESSMENT
Calculating Your Security Risks
Securing Information Assets: Planning, Prevention and Response
All Security Products in the Store....
SUBSCRIBE TO CSO
Apply today for your FREE subscription to CSO magazine, the magazine for senior security executives. Offer valid in U.S. and Canada only.
Non-U.S. click here