Integrated Behavior: Improvement Over Stovepipes

Schwartau, Winn
September 2008
Security: Solutions for Enterprise Security Leaders;Sep2008, Vol. 45 Issue 9, p128
Trade Publication
The article presents the information security of Whistler Cougar Corp. (WCC). WCC has over 22,000 employees in 34 countries and it takes information security very seriously. Its business units include hotels, finance, food, and travel and tourism. The company has to comply with a wide range of governances in the U.S. The company has begun a program to phase out Windows at the end-points of their networks in favor of Linux and Mac OSX.


Related Articles

  • SECURITY POLICIES AND PROCEDURES. Pabrai, Uday O. Ali // Certification Magazine;May2004, Vol. 6 Issue 5, p52 

    The article provides guidelines on the development and implementation of security policies and procedures in an organization's information security program. The objective of developing security policies should include the development of information security and other security policy documents,...

  • SECURITY A TOP 10 TECH CONCERN.  // Practical Accountant;Apr2007, Vol. 40 Issue 4, p18 

    A list of the top 10 information security management issues in 2007 is presented. The number one factor that has a powerful impact over businesses is the protection of critical systems and information. Next, is identity and access management. Such technologies involve the application of...

  • Graphical Password Security Evaluation by Fuzzy AHP. Lashkari, Arash Habibi; Manaf, Azizah Abdul; Masrom, Maslin // World Academy of Science, Engineering & Technology;2012, Issue 66, p289 

    In today's day and age, one of the important topics in information security is authentication. There are several alternatives to text-based authentication of which includes Graphical Password (GP) or Graphical User Authentication (GUA). These methods stems from the fact that humans recognized...

  • THE GREAT PRIORITY PUZZLE. Samani, Raj // Computer Weekly;4/15/2008, p24 

    The article presents the author's views on information security. The author thinks that compliance, security and operability are interlinked risk objectives for an organisation. According to the author, more regulation and greater reliance on internet will drive security demand. It is stated...

  • Vendors line up to see Jericho vision. Condon, Ron // SC Magazine: For IT Security Professionals (UK Edition);Feb2005, p12 

    This article reports on the white paper that will be published in February 2005 with the goal of outlining the future of information security. It will be the product of a year's intensive discussion between a group of global organizations. It started in Europe, but now encompasses the developed...

  • Problems and solutions. McKeough, Kevin // Crain's Chicago Business;2/26/2007, Vol. 30 Issue 9, p20 

    The article focuses on various information security problems faced by different organizations in the U.S. The incidents of laptop thefts in Boeing Co. led the company to put encryption software on the company's laptops and instituted a policy requiring users to apply it to all sensitive data. A...

  • IS Security Requirements Identification from Conceptual Models in Systems Analysis and Design: The Fun & Fitness, Inc. Case. Spears, Janine L.; Parrish Jr., James L. // Journal of Information Systems Education;Spring2013, Vol. 24 Issue 1, p17 

    This teaching case introduces students to a relatively simple approach to identifying and documenting security requirements within conceptual models that are commonly taught in systems analysis and design courses. An introduction to information security is provided, followed by a classroom...

  • This intrusion is no test. Ollman, Gunter // SC Magazine: For IT Security Professionals (UK Edition);Apr2004, p29 

    This article presents the author's opinion on the need to focus attention on test environments, which are apparently considered a computer security weakness. When assessing the internal security of my clients, there is one area of their infrastructure and operational processes that continues to...

  • Information Systems: VA Computer Control Weaknesses Increase Risk of Fraud, Misuse, and Improper Disclosure: AIMD-98-175.  // GAO Reports;9/23/1998, p1 

    Computer control weaknesses put critical operations at the Department of Veterans Affairs (VA), from health care delivery to benefit payments to home mortgage loan guarantees, at risk of misuse and disruption. In addition, sensitive information in VA's systems, including financial transaction...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics