'We're All Witch Doctors'

Hunt, Steve
June 2008
Security: Solutions for Enterprise Security Leaders;Jun2008, Vol. 45 Issue 6, p24
Trade Publication
The author reflects on how security industry personnel could manage risk which threatens clients. The author states that it is the task of the security personnel to keep unrelenting risk away from clients, by continuing to secure networks and the rest of the security apparatus to protect company's vital information. The author emphasizes the importance of nurturing mutual trust and confidence with clients in implementing information technology (IT) security.


Related Articles

  • Get Up-to-speed on Security Network Fundamentals. Koebbe, Paul // SDM: Security Distributing & Marketing;Oct2008, Vol. 38 Issue 10, p75 

    The article discusses the challenge faced by information technology (IT) installers in learning the concept of networking. It states that many security industry professionals are encountering more Internet protocol (IP)-technology projects who have not had the opportunity to learn the benefits...

  • Converged security pays dividends. Ting, David // Network World;6/18/2007, Vol. 24 Issue 24, p32 

    The article discusses the significance of security convergence to users and security staff. According to the author, the benefits of security covergence include the promotion of subtle changes to employee behavior that increase overall security, strengthens ability for companies to enforce...

  • Taking IT security to the next level. Bradbury, Danny // Computer Weekly;8/15/2006, p26 

    The article focuses on various issues related to security in the IT industry with specific reference to the two-factor authentication which will increase the security bar for corporate networks. With businesses' faith in passwords is declining, many banks are increasingly using enhanced security...

  • The "Parallel" World with IT. Engebretson, Dave // Security: Solutions for Enterprise Security Leaders;Mar2005, Vol. 42 Issue 3, p48 

    Provides information regarding developments in electronic security systems in the U.S. Importance of understanding the benefits of networked security systems and the ability to use network infrastructure and equipment; Responsibilities of information technology managers in ensuring the safety of...


    The article reports on the introduction of Securitas line of Network Intrusion Detection Systems (NIDS) by Netreo to complement and integrate with the Omniscient family of information technology (IT) and security management products. Securitas is implemented as an appliance-based,...

  • Understanding Networking is Future-crucial. Engebretson, Dave // Security: Solutions for Enterprise Security Leaders;May2006, Vol. 43 Issue 5, p65 

    The article focuses on the significance of understanding IT-networking enabled technologies for security systems integrators. They are continuously being faced with new ways of installing security systems and end-users are experiencing new ways those systems can be used. The IT industry is far...

  • Research on Undertaking Practical Education Network Platform Security Mechanism. Delin Sun; Gaoxiang Xu; Pin Lv; Yu Li; Jie She; Jiaxin Lo; Jiao Lee; Yangming Lau // Applied Mechanics & Materials;2014, Issue 530-531, p794 

    Undertaking practical education network platform is a network platform with strong practicalness, there're many security issues when developing and operating. From the angle of founding and operating a security website, this article focused on how to found a security operating environment and...

  • ASK THE EXPERT.  // SDM: Security Distributing & Marketing;Nov2006 Supplement, Vol. 36, p18 

    The article presents question-and-answer advisory related to security system installation. A technician asks if the entire Internet Protocol-based video surveillance system should be set up before the actual installation. Another technician asks why customers sometimes seem disappointed when...

  • Navigating The Crossroads. NIELSEN, MIKE // Government Security;Aug2005, Vol. 4 Issue 6, p20 

    Discusses the invisible threat of computer network attacks that has been integrated into the physical protection of facilities and staff. Correlation of strategies, tools and specialized staffs; Threat of unauthorized physical access to network assets that can lead to downtime and disruption;...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics