by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : September 30, 2013
Information technology security is an inherently evolving business. It s a game of chase, with vulnerability exploiters and technology racing to stay a step ahead of each other. In the grand scheme of security, the United States is well positioned, but there s no room for complacency. Instead, to stay ahead, organizations need to look at the next best security methods, and these days that s endpoint analytics, said Matthew McCormack, a partner at Aerstone, during an Aug. 15 webcast titled "Security Intelligence Through Endpoint Analytics: Delivering Insight from Chaos." "We actually have a very strong security operation, a very strong security culture within the agencies and within a lot of companies," said McCormack, a former chief informa- tion security officer at the Defense Intelligence Agency. "There s lots of room for improvement, and every day you re hearing about new hacks, new compromises, new insider compro- mises, more things going on." That s why the technology that worked yesterday might not be the best choice tomorrow. "The security field is a fascinating field and every year there s another major topic that we re discussing and a major refocus of our energies, and I don t think that will ever change," he said. "We need to be flexible and understand that we might have just spent a lot of time and a lot of money building a security infrastructure and the very next year a lot of that may be obsolete because a new compromise comes out." In 2008, a robust security system typically entailed firewalls, virus scan- ning, USB disablement, intrusion detection and prevention, employee background checks and training, and policies, McCormack said. Today those things are not obsolete, but the list is longer and more complex. Threats come from insiders such as Edward Snowden, a government contractor, and the people behind WikiLeaks, as well as social media, mobile devices and bring-your-own-device plans, portable mass storage devices, cloud storage, and software-as-a-service monitoring. "Defined networks are phasing out," McCormack said. "There are very few nice, clean networks anymore where you know you have 10,000 Windows endpoints, you have 1,000 Windows servers and they re all running the same version. Those don t really exist anymore. Mobile iPads, iPhones, Androids have really changed that whole dynamic." The fundamental question becomes defining what data your agency owns and securing it. This is no easy feat considering that about 300 billion e-mail messages are sent per day worldwide and about 3.7 billion people are expected to use social media in 2014, he said. "Without any kind of really good D D D D D DI I I I I IG G G G G G GI I I I I IT T T T T TA A A A A AL L L L L LD D D D D DI I I I I IA A A A A AL L L L L LO O O O O O OG G G G G G GU U U U U UE E E E E E ENDPOINT ANALYSIS BOOSTS IT SECURITY Anomaly-based data, visualization and virtualization can give IT managers greater insight into what s coming and going through their networks LISTEN/LEARN: For a replay of the webcast, go to: FCW.com/EndpointAnalysis SPONSORED CONTENT Highlights from a recent webcast on secure mobility Without any kind of really good endpoint visibility, you don't know where your data is going." --- Matthew McCormack, partner at Aerstone
September 15, 2013
October 30, 2013