information-security love

information-security

Definitions

Sorry, no definitions found. Check out and contribute to the discussion of this word!

Etymologies

Sorry, no etymologies found.

Support

Help support Wordnik (and make this page ad-free) by adopting the word information-security.

Examples

  • Pete Lindstrom , research director at information-security research firm Spire Security, said it would be difficult for RSA to manufacture and replace millions of tokens in a reasonable time.

    SecurID Clients Get Jitters Shara Tibken 2011

  • The implementation of clear acceptable-use policies, a comprehensive employee training program and ongoing risk assessments are central to an information-security strategy.

    Loose Keystrokes Sink Cybersystems 2011

  • As Eric Cowperthwaite , Providence Health & Services' chief information-security officer, put it: "Doctors have been taught that they are the ultimate arbiter of what happens in their sphere of influence."

    Health-Care Industry: Heal Thyself M. Eric Johnson 2011

  • Don Jackson is director of threat intelligence at information-security firm SecureWorks, and has provided information on Zeus operations to federal law enforcement.

    Hackers Siphoned $70 Million Evan Perez 2010

  • However, this approach is best thought of as a framework, not a panacea, for making sound information-security investments.

    You May Be Fighting the Wrong Security Battles Lawrence A. Gordon 2011

  • A recent wave of information-security breaches at high-profile companies has many executives on heightened alert.

    You May Be Fighting the Wrong Security Battles Lawrence A. Gordon 2011

  • Don Gray, chief security strategist at Solutionary, an information-security company, has several predictions for the coming year:

    Security warnings -- and safety tips -- for 2010 2009

  • "The information-security procedures that we have are not something we created six months ago, or a year ago, or six years ago," Mr. Goldstein says.

    BlackRock's 'Geeky Guys' Business Mary Pilon 2011

  • "We know anywhere in the world what our risk is," says John Streufert , State's chief information-security officer and one of the program's four creators.

    The Government Model Siobhan Gorman 2011

  • However, contrary to conventional wisdom, the overwhelming majority of security breaches have little economic impact on corporations—all the more reason to use this kind of cost-benefit analysis to allocate finite information-security resources.

    You May Be Fighting the Wrong Security Battles Lawrence A. Gordon 2011

Comments

Log in or sign up to get involved in the conversation. It's quick and easy.