Columnist Paul Raines argues that visa restrictions and other measures come with a big price and what's good for security isn't necessarily good for America.
Big pharmaceutical companies' RFID trials aim to keep fake drugs out of your medicine cabinet—but the technology has significant limitations.
Image spam—an e-mail solicitation that uses graphical images of text to avoid filters—is not new, but recently it reached an unprecedented level of sophistication and now comprises up to 40 percent of e-mail. It is expected to keep rising. To battle it, you must understand it, and this interactive graphic can help you.
Also see »
The Scourge of Image Spam
Polymorphic malware changes shape to fool detection schemes.
What computer models are telling us about how to manage a crowd, the ancient Romans already seemed to know. This interactive article includes a slideshow demonstrating how Pompeii Stadium architecture facilitated the flow of 30,000 spectators—and allowed it to be emptied in just 10 minutes—as well as video clips that can show us how to safely engineer spaces for large gatherings and the flow of thousands, sometimes millions, of people.
Also see:
CSO Research Centers |
|
CSO Resources/Tools |
|
Talking about the conflagration at hand instead of fire prevention.
More>>
This year’s study revealed that while security events and electronic crimes were steady against last year’s findings, there are real concerns that security executives may be becoming over confident.
CSO, in conjunction with analyst firm Aberdeen, brings you the latest security research.
Roger Johnston, leader of the Vulnerability Assessment Team at Los Alamos National Labs, developed this quiz that identifies the 28 attributes of a flawed security system. Find out how you rate with this interactive assessment tool.
Check out all our interactive tools:
You may qualify for a FREE subscription to our print magazine, the Resource for Security Executives
HP Identity Management makes sure that employees have secure access to the systems and applications they need to do their jobs, while preventing unauthorized access. This flash demo provides a view of both user and administration, highlighting the features of IdM through a simulated demo of use case scenarios.
Download the new HP whitepaper and learn the benefits of delivering a service-centric IdM infrastructure to automate and secure change throughout the all enterprise lifecycles: user, IT, and business. This paper breaks down the tasks of an IdM solution, discusses the need for automation and compares traditional role based vs. a service centric approach.
In this Aberdeen Group report, you'll learn about obstacles companies have encountered over the past 12 months and why achieving superior protection of cardholder data requires a combination of strategic actions, business process capabilities, and enabling technologies. See how your company can achieve successful compliance today.
In this Aberdeen Group Sector Insight, which spans five years, two million respondents, 644,000 organizations, and up-to-the-minute feedback from 3,670 survey respondents you'll gain deep insights through analysis based on industry, geography, job function, and company size. Read all the facts and recommendations for action in this information-packed report.
Today's consumers are understandably concerned about using the Internet due to increasing identity theft and online fraud. In this white paper, you'll learn how RSA solutions can help you put your customers at ease by providing them with assurance that their online interests are protected by effective security features.
Sponsored Links:
Business Continuity: 2007 Research Brief
Read how CIOs and other IT pros rated their companies' Business Continuity readiness.
Register today for this free virtual conference and receive our exclusive Endpoint Security Survey to benchmark your efforts against those of your peers.
advertisement