The worst happens What next?

Morbin, Tony
September 2014
SC Magazine: For IT Security Professionals (UK Edition);Sep/Oct2014, p25
The article discusses how to respond to and recover from cyber breaches. Topics discussed include cyber resilience, the four-step approach proposed by Bruce Schneier of Co3 Systems, and the utilization of best practice following resolution of vulnerabilities in the network or inside threat. Also discussed are the three p's in the formation of an effective cyber-security strategy, efficient incident management response, and the use of simulation to build capacity and competency.


Related Articles

  • Schneier: 'Two-factor security is not our saviour'. Goodwin, Bill // Computer Weekly;3/22/2005, p8 

    The article reports that moves by British banks to introduce two-factor authentication will not protect the public against phishing attacks and identity theft, international security expert Bruce Schneier said. Schneier, a security technologist, author and founder and chief technical officer of...

  • Brace for web worm chaos, users warned. Goodwin, Bill // Computer Weekly;5/3/2005, p10 

    This article reports that security expert Bruce Schneier has warned that businesses should brace themselves for attack by sophisticated new worms capable of causing widespread disruption to the Internet. Schneier, a security researcher, author and chief technology officer at security services...

  • What Is a Black Hat?  // Information Security;Jul2005, Vol. 8 Issue 7, p18 

    Defines the term black hat according to several information security experts. Bruce Schneier, CTO of Counterpane Internet Security; Ron Baklarz, CISO for the American Red Cross; Kevin Mitnick.

  • GAINING INSIGHTS ON SECURITY.  // eWeek;08/21/2000, Vol. 17 Issue 34, p55 

    Discusses computer security expert Bruce Schneier's comments on the inability of cryptography to adequately protect computer networks and Web sites from hackers. Importance of managed services; Schneier's release of a book called `Secrets & Lies'; Call for the implementation of old-fashioned...

  • Lost My Secrets? Pay Up, Buddy! Levy, Steven // Newsweek;6/20/2005, Vol. 145 Issue 25, p12 

    Questions why Citigroup did not use encrypted computer tapes to transport personal financial information for millions of customers. The possibility that the information could be in the hands of identity thieves; The data lost by Time Warner to computer hackers; Indication that ChoicePoint sold...

  • Untitled. Ashford, Warwick // Computer Weekly;6/23/2009, p60 

    The article focuses on the influence of social networking media on the international politics. It is reported that in Iran, the opposition used blogging services such as Twitter.com to protest over the result of presidential election. Security expert Bruce Schneier states that the Iranian...

  • IT Blueprint for 2009. Lundquist, Eric // CIO Insight;Dec2008, Issue 100, p11 

    The article discusses reports published within the issue, including one on business activities in 2009, one by Brian Watson on the uncertainty of information technology research, and one by Ed Cone on his interview with Bruce Schneier.

  • Make firms bear the cost to improve information security, says Schneier. Richards, Justin // Computer Weekly;5/22/2007, p32 

    The article reports on the trends outlined by information security leader Bruce Schneier, on changing the landscape of information security. Schneier argues that hacking has become a criminal pursuit and that there are many ways to make money criminally on the Internet. He adds that the...

  • Security Theater. Phillips, Zack // Government Executive;Aug2007, Vol. 39 Issue 13, p42 

    The article reports that the highly exaggerated threat of terrorism has cost the U.S. far more than terrorist attacks ever did. According to author and security consultant Bruce Schneier, the cost-ineffective measures which are being taken by U.S. administration are termed as "security theater"...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics