The 10 most significant events regarding government cybersecurity in 2009 saw its genesis with the inauguration of a Blackberry-toting chief executive, the most tech-savvy president to occupy the Oval Office.
This is always a fun exercise.
I spent some time today looking back over all the articles we published (so far) in 2009.
And that number is 891, by the way - an average of just over 17 per week, or three-plus per weekday. But the number that concerned me most is 10 - what have been the top 10 most popular stories...
This is the last thing you'd want during the holiday season.
I lost my purse at a local movie theater recently, and within a couple hours realized my loss. Nervously, I rushed to the customer service department, all the while hoping to get my grey tote bag handed safely from underneath the counter.
The Advanced Persistent Threat - what exactly is it, and how are organizations vulnerable?
Ron Gula, CEO of Tenable Network Security, explains the threat and the challenges to mitigating it. In an exclusive interview, Gula discusses:
Why some organizations are especially vulnerable;
Strategies and solutions...
What will be the hottest skills and competencies within information security in 2010?
Application security and biometrics are among the in-demand skills, according to the latest quarterly published list of the 2009 IT Skills Pay and Demand Trends Report by Foote Partners, LLC.
It's a never-ending battle -- the list of naughty and downright evil security threats that challenge financial institutions and security professionals.
From organized crime to SQL injection, here are the experts' choices of eight major security threats to watch in 2010.
Marcus Ranum has a unique take on the biggest information security threats to organizations and individuals.
A renowned expert in secure systems and design, Ranum, currently the CSO of Tenable Network Security, offers a new look at topics such as the risks of cloud computing and what he calls the myth of cyber...
In terms of information security, what is the state of auditing as we end 2009 - and what are the trends foreseen for 2010?
Warren Stippich Jr., Practice Leader of the Chicago Business Advisory Services Group of Grant Thornton LLP, discusses:
Where organizations are most vulnerable;
When it comes to protecting their customers' identities, how do the major banking institutions rate?
Javelin Strategy & Research has just released a new Banking Identity Safety Scorecard that ranks the major institutions. In an exclusive interview about the report, James Van Dyke discusses:
How the scorecard was...
Interview with Jay Foley of the Identity Theft Resource
Financial scams and incidents of medical identity theft are on the rise - and they're among the main threats to business and consumers in 2010.
This is the warning from Jay Foley, executive director of the Identity Theft Resource Center. In an exclusive...
How much do you actually know about time and the critical role it plays in your organization?
In a preview of his new webinar, Time: The Hidden Risks -- How to Create Compliant Time Practices, Bill Sewall discusses:
Why time is such a critical business issue;
Risks and opportunities presented by time;
OK, it's year-end and everybody is thinking about the biggest this, biggest that of the year - of the decade, even. And we'll have our own lists, too, no worries. There's a lot to look back upon this year, and even more to look forward to in 2010.
But what are on my mind today are the big stories that no one seems...