IT/Networking Columns & Features Archive

  • At the Frontline: Fairfax County CISO Michael Dent

    IT security expert discusses protecting public sector computer networks from cyber attacks

    Article • December 15th, 2011

  • Convergence Q&A: The ROI of Being IT-Savvy

    I and many of my colleagues on the ASIS IT Security Council can easily take our IT knowledge for granted, and a recent experience during a video security system acceptance test brought its value home. The situation reminded me of a question that I am...

    Article • December 2nd, 2011


    Security industry thought leaders share their take on all things technology, standards and services.

    Article • December 1st, 2011

  • Kaspersky Lab, Kyrus Tech and Microsoft disable the Hlux/Kelihos botnet

    Botnet responsible for delivering spam, stealing personal data and performing DDoS attacks

    Article • October 5th, 2011

  • Develop a Flight Plan

    Failing to map out a plan of action can have dire consequences in both our personal and professional lives. Professionally-speaking, have you thought about what you would do in the event of a security incident? No, I’m not talking about a physical...

    Article • September 28th, 2011

  • The Virtual 9/11

    Point-of-Sale systems may be the ultimate IT Security vulnerability

    Article • September 2nd, 2011

  • Identity Management’s Great Bang for the Buck

    Identity and access management (IAM) technologies can help you gain the necessary control of user accounts

    Article • August 31st, 2011

  • The two distinct approaches to data loss prevention

    Comparing data-at-rest to data-in-motion security procedures

    Article • August 9th, 2011

  • How to Retain Your IT Talent

    How is your IT staff retention? Are your IT professionals in it for the long haul, or are they just going through the motions waiting for the next best thing? The solutions for retaining IT talent are relatively simple. It is not really about money...

    Article • June 9th, 2011

  • Bringing Back the Good Old Days

    It’s amazing what a decade will do to a market — especially in the ever-changing world of security. Back during the dot-com craze of the mid to late 90s, IT security was a hot commodity. Individual security researchers and developers such as Peter...

    Article • May 19th, 2011

  • Know Your IP Network

    An IP-networked based system can be reliably built. And it all starts with planning. By anticipating worst case scenarios, predictable performance can be achieved. Leverage the knowledge and expertise of your partners to create a plan for success that...

    Article • April 15th, 2011

  • Navigating the Security Industry

    three important principles which impact integrator success include: harnessing ever-changing technology; approaching security as a value-added service provider and not just as another security contractor; and recognizing the extraordinary importance of...

    Article • April 14th, 2011

  • Ingram Micro Canada named value added distributor for gateProtect

    Company extends partner network to Canada

    Article • March 30th, 2011

  • Once More Into the Breach

    Imagine the scenario: Your network has been penetrated and sensitive data has been exposed. From a public relations mess, to an expensive forensics analysis, to improper handling of breach notifications, to those affected — everything that could have...

    Article • March 24th, 2011

  • VASCO acquires DigiNotar

    Acquisition to strengthen company's PKI and DIGIPASS offerings

    Article • January 11th, 2011