Search For:

Displaying 1-3 out of 3 total
A View from the C-Suite
Found in: IEEE Security & Privacy
By Edward G. Amoroso,Hugh Thompson
Issue Date:January 2013
pp. 11-12
Businesses need to make tradeoffs: they need to balance resources between delivering technology that will help them grow while committing resources to protect the enterprise. This special issue taps into the business view of information security.
The Human Element of Information Security
Found in: IEEE Security & Privacy
By Hugh Thompson
Issue Date:January 2013
pp. 32-35
Information security has long hinged on trusted insiders' ability to make good decisions. However, modifying human behavior through training is difficult; some battle-worn security executives might even dismiss it as impossible. Although foundational contr...
The State of Embedded-Device Security (Spoiler Alert: It's Bad)
Found in: IEEE Security & Privacy
By John Viega,Hugh Thompson
Issue Date:September 2012
pp. 68-70
Embedded-systems security is a mess, and the embedded-software industry needs to start focusing on it. This will involve moving beyond just the technology to rethink our assumptions of how people will actually use and maintain embedded devices.