CSO Homepage - information and insights for senior security executives and Chief Security Officers; CSO Magazine is an IDG publication -
CSO Newsletters
CSO
  Home                                                                                                          2004 ASBPE Magazine of the Year
Home                                                                      2004 ASBPE Winner - Best New Web Publication
 
Spotlight
+
+
+
+

@CSOonline.com
NEWS
Tuesday's News Stories
UPDATE: ** The FTC said Tuesday that it had won a court order to shut down x-rated spammers, reports the Associated Press. ** President Bush selects his new Homeland Security nominee, federal appeals court judge Michael Chertoff, reports the Associated Press. Insurgents kill at least 13 more Iraqis in new attacks, according to The New York Times. Federal officials tell Washington D.C. it must cover more than $17 million in security costs associated with the inauguration, reports the Washington Post.



SECURITY CHECK
Do you think a security-related incident will disrupt the inauguration of President Bush?
Yes
No


View results without voting


ANALYST REPORT
Wireless E-Mail: An Overview
Gartner identifies several requirements for efficient and secure enterprise deployment of wireless e-mail.

[Read All Reports]


TALK BACK
What Are Your Security Resolutions for 2005?
Did you make any New Year's resolutions for your organization? Share them with us. If you haven't, we're happy to suggest a few.


Sarah ScaletOPINION
The Offshore Sniff Test
When it comes to offshore outsourcing, the real privacy problem is what companies are keeping secret




CAREER
CSO Wanted
Security executive positions from around the world. Including:
CSO Wanted accepts postings for senior security positions at no charge.

CAREER
CSO Career Adviser
Looking for security executive career advice? Our resident experts, Joyce Brocaglia and Pete Metzger, answer your questions about certification, getting started and more. This week a reader asks: "Is security engineering a wrong turn?"



SECURITY COUNSEL
Video Surveillance
John Kingsley-Hefty has been involved in security design for more than 28 years. He worked in 3Mís Corporate Security Services department as a consulting architect, specializing in security design for 3Mís facilities worldwide. In 1997, he formed Secure Environments, which helps clients design better security and integrated business solutions. He is available now to answer your questions about video surveillance and the technology options that may be right for your business.




GUEST OPINION
A Good Worm Is Hard to Find
Are "benevolent" worms the best solution to the patching problem? This CTO doesn't think so.



CAREER
Movers and Shakers
DHS CSO Resigns for Consulting Post; Tacoda names Pinney CPO; Golden Telecom names Wallace CRO; and more.



SURVEY
CSO Magazine and CERT Security Capability Assessment Tool
Are your security practices repeatable, documented, and regularly reviewed and updated? Test your security strategy and policies. Results of the overall Security Capability Assessment Tool findings will be available at CSOonline.com later this year.



Safety in Numbers
Antispyware Revenues to Climb


CAREER
Events Calendar
Our collection of security-related events from around the world. Some of the listed events:

Post security-related events at no charge.


GLOSSARY
Security A to Z
Learn the lingo of the security industry by visiting our new online glossary. From "abuse of privilege" to "white hat hacker," we've got it covered.



CSO Research Centers
In-depth information on critical topics:
The January 2005 Issue
Michael Assante, CSO of American Electric Power
· Russian Roulette
· Reality TV
· A Long Way to Grow
· Securing the Post-Human Future

· And Much More...




FROM THE EDITOR
Men Behaving Badly
The big talk recently in the world of sports concerned the player-fan basketball melee in Detroit.



CYBERCRIME
Russian Roulette
Hacker Alexey Ivanov was lured to the United States and snared in a high-stakes cyber-sting. The FBI says he got what he deserved. But Ivanov says his gamble paid off. In the end, he got what he wanted all along.



VIDEO SURVEILLANCE
Reality TV
The reasons to invest in new video surveillance systems are everywhere. Zoom in on these six insights to help you focus on what's important and what's just hype.



INFOSECURITY SURVEY
A Long Way to Grow
First results from a new security management survey indicate that many companies have only rudimentary practices in place



THE LONG VIEW
Securing the Post-Human Future
CSOs will very likely live to see the day when human brains are easily augmentable through an array of knowledge implants, apps and Wi-Fi capabilities. If securing an enterprise seems tricky today, imagine installing firewalls in a few thousand employees' prefrontal lobes.



BRIEFING
· The Electronic Road to the White House
· Ridge's Successor Can Beef Up Public-Private Ties
· Employers Fight Oklahoma Gun Law
· The Security Blotter
· Bug Vendors


SECURITY COUNSEL
Identity Protection
Judith Collins is an associate professor at the School of Criminal Justice at Michigan State University. She answers readers' questions about securing customers' and employees' personal information.


CSO UNDERCOVER
Why Convergence Is Elusive
Last month, CSO's editor asked why CSOs can't all just get along in a world of converged security management. The problem is that we've got to raise our profiles in the corporate world first.



WONK
Challenges In and Out
As DHS struggles to find a permanent cybersecurity chief, its CIO and CISO are grappling with challenges of their own



MACHINE SHOP
Beyond Passport Vulnerabilities
Security flaws in high-profile products like Microsoft's Passport led experts and vendors to find new ways to disclose bugs



TOOLBOX
Putting Out Fires
It wasn't your typical vendor meeting, reports a CSO colleague of mine.



DEBRIEFING
Great Moments in Vulnerability Disclosure


+READ THE ENTIRE JANUARY ISSUE


Webcasts
Grid Computing Identity and Access Management: Securely Let Business In, Keep Risk Out

Grid Computing Effective Strategies for Enterprise Vulnerability Management


Grid Computing ALL CSO WEBCASTS...

CSO Perspectives
Balancing the Art & Science of Security
April 10 - 12, 2005
Hyatt Regency Huntington Beach, CA
The CSO Perspectives Conference will examine the complex balancing act between the art and science of security by looking at what the top practitioners are thinking and doing, and by listening to what leading security and privacy experts think will affect the landscape of the future. Learn More.


Security Buyer's Guide
Compare and select the best security vendor for your needs. If you have products to sell, use this service to put your company in front of the thousands of corporate management and security professionals with real buying power, who come to CSO every day. Visit the CSO Buyer's Guide.

Sponsored White Papers
+MessageLabs Email Security for Enterprise: New WP

+Anti-Spyware: Securing the Corporate Network

+The Need for Patch Management

+CSO Focus: Content Filtering

+ All CSO White Papers...


In the CIO Store
+2003 IT SECURITY ASSESSMENT

+ Calculating Your Security Risks

+Securing Information Assets: Planning, Prevention and Response

+All Security Products in the Store....


SUBSCRIBE TO CSO


Apply today for your FREE subscription to CSO magazine, the magazine for senior security executives.


Offer valid in U.S. and Canada only
Non-U.S. click here
.

First Name:
Last Name:
Company Name:
Title:
Mailing Address:
City:
State/Province:
Zip/Postal Code:
Email Address:

NOTE: Complimentary subscriptions sent only to those applicants who qualify


advertisers




Sponsored Links:

· MessageLabs Email Security for Enterprise: New WP

· Achieving Data Integrity for Compliance

· WEBINAR: DOES ACCESS CONTROL MATTER? Register & Receive IDM White Paper

· Radware DefensePro 3-Gbps intrusion prevention switch

· Block P2P with eSafe -- maximize bandwidth, minimize legal liability

· Microsoft, Gartner Webinar - Simplified Identity Management, Stronger Authentication




THE IDG NETWORK
CIO :: CMO :: Darwin :: Computerworld :: Network World :: Infoworld :: PC World :: Bio-IT World
IT Careers:: JavaWorld :: Macworld :: Mac Central :: Playlist :: GamePro :: GameStar :: Gamerhelp



   2002-2005 CXO Media Inc.                 Privacy Policy

January 12, 2005