Newsletters:
More Articles by Richard Stiennon

The New Face of Cybercrime Revealed


By

Richard Stiennon

| CIO Insights Article Published May 6, 2009
Now that the results have had some time to settle, CIOUpdate columnist Richard Stiennon puts the widely quoted Verizon data breach report into perspective.

Cyber War is Part of Real-World Conflicts Today


By

Richard Stiennon

| CIO Insights Article Published February 19, 2009
Avoid becoming collateral damage in the next outbreak of hostilities, writes CIOUpdate columnist Richard Stiennon of IT Harvest.

Social Networks Are Risky Business


By

Richard Stiennon

| CIO Insights Article Published December 17, 2008
From lax security practices to brand rip offs, social networking sites can be bad for your company, writes CIOUpdate columnist Richard Stiennon.

Do We Need a National Data Security Bill?


By

Richard Stiennon

| CIO Insights Article Published March 19, 2008
It wouldn't hurt, writes CIOUpdate columnist Richard Stiennon.

Data Protection is Impossible


By

Richard Stiennon

| CIO Insights Article Published March 12, 2008
Too many devices in too many places with too much access make for a real pain in the a$$.

TJX Demonstrates Data Protection Doesn't Matter


By

Richard Stiennon

| CIO Insights Article Published March 5, 2008
With TJX back in news CIOUpdate columnist Richard Stiennon wonders if data security best practices will survive the fallout … if there is any.

The Security Connection Between WAN , Virtualization and UTM


By

Richard Stiennon

| CIO Insights Article Published February 27, 2008
As the enterprise gets more distributed, three major consolidation trends are becoming interdependent, writes CIOUpdate columnist Richard Stiennon.

The Face of IT Research is Changing


By

Richard Stiennon

| CIO Insights Article Published February 28, 2007
Because of the Internet, the IT research industry is in a state of flux, writes CIO Update columnist Richard Stiennon of Fortinet.

Cyber-Defenses Never Enough


By

Richard Stiennon

| CIO Insights Article Published November 15, 2006
It is imperative to cover all of your security bases; driving the cost of theft out of reach, writes CIO Update columnist Richard Stiennon of IT Harvest.

The Best Defense Against Social Engineering


By

Richard Stiennon

| CIO Insights Article Published October 19, 2006
Here's a hint: It's not training, writes CIO Update columnist Richard Stiennon of IT Harvest.

The Economics of Cybercrime


By

Richard Stiennon

| CIO Insights Article Published September 7, 2006
The best way to understand, and thus counter, cyber criminals is to study the threats, writes CIO Update columnist Richard Stiennon of IT Harvest.

Network Admission Control is a Blind Alley


By

Richard Stiennon

| CIO Insights Article Published July 31, 2006
Secure network fabric is the right path, writes CIO Update columnist Richard Stiennon of IT Harvest.

The Problem With 'Defense-in-Depth'


By

Richard Stiennon

| CIO Insights Article Published June 21, 2006
It's time to start thinking about a better way to manage your security, writes CIO Update columnist Richard Stiennon of IT Harvest.

Being a Late Adapter in Security is Not An Option


By

Richard Stiennon

| CIO Insights Article Published May 5, 2006
Most IT departments are in continuous reaction mode because they rarely anticipate changes, writes CIO Update columnist Richard Stiennon of IT Harvest.

Lessons Learned from Biggest Bank Heist in History


By

Richard Stiennon

| CIO Insights Article Published April 19, 2006
The U.K.'s Sumitomo bank heist last year holds important lessons for IT security pros, writes CIO Update columnist Richard Stiennon of IT Harvest.

Do You Need a CSO?


By

Richard Stiennon

| CIO Insights Article Published January 18, 2006
Only 24% of companies have chief security officers. So the question on CIO Update columnist Richard Stiennon's mind is: Do you need one?

Evaluating Security Startups


By

Richard Stiennon

| CIO Insights Article Published November 16, 2005
Want a better way to evaluate the startup security vendor at your door? CIO Update columnist Richard Stiennon of Webroot Software offers some practical advice on choosing the right one.

Web Application Firewalls: The First Layer of Protection


By

Richard Stiennon

| CIO Insights Article Published October 19, 2005
For targeted attacks, web pages are open doors, writes CIO Update columnist Richard Stiennon of Webroot Software.

The IT Recession Has Ended � And No One Noticed


By

Richard Stiennon

| CIO Insights Article Published August 24, 2005
IT is ready to boom again. Are you taking advantage?, asks CIO Update columnist Richard Stiennon of Webroot Software.

Are You Prepared for Competitive Intelligence?


By

Richard Stiennon

| CIO Insights Article Published July 21, 2005
Competitive intelligence gathering (read corporate espionage) is the latest threat in the never ending game of spy vs. spy, writes CIO Update columnist Richard Stiennon of Webroot Software.