Newsletters:
More Articles by Ed Adams

The Six Best Practices of IT Security


By

Ed Adams

| CIO Insights Article Published May 23, 2007
These half-dozen practices will integrate security into your information management and application life cycle, writes CIO Update columnist Ed Adams of Security Innovation.

Misconception No.5: The "Recency" Trap


By

Ed Adams

| CIO Insights Article Published March 28, 2007
Knee-jerk reactions to recent events do not improve security, writes CIO Update columnist Ed Adams of Security Innovation in the last installment of this five-part series.

Misconception No.4: Assuming Secure Software is Costly


By

Ed Adams

| CIO Insights Article Published March 14, 2007
Securing software in the development process is a lot less expensive than fixing issues after the fact, writes CIO Update columnist Ed Adams of Security Innovation in Part IV of his five-part series.

Misconception No.3: Too Many People Assumptions


By

Ed Adams

| CIO Insights Article Published March 1, 2007
WARNING: This is not going to be a “glass-half-full” kind of article, writes CIO Update columnist Ed Adams of Security Innovation in Part III of his five-part series.

Misconception No. 2: Believing the Hype of Technology and Tools


By

Ed Adams

| CIO Insights Article Published February 13, 2007
Tools alone don’t make people smarter or processes better, writes CIO Update columnist Ed Adams of Security Innovation in Part II of this five-part series.

Misconception No.1: Over-Relying on Network Defenses


By

Ed Adams

| CIO Insights Article Published January 31, 2007
CIO Update columnist Ed Adams of Security Innovation lays out the first big 'Oops' companies make when thinking about security in Part I of this five-part series.

The Five Most Common Misconceptions of Enterprise Security


By

Ed Adams

| CIO Insights Article Published January 24, 2007
CIO Update columnist Ed Adams of Security Innovation lays out his favorite pet-peeves.

Regulatory Compliance Starts with Software


By

Jack Danahy

| CIO Insights Article Published November 8, 2006
Regulatory mandates need to be addressed at the development stage, write CIO Update columnist Ed Adams of Security Innovation and CIO Update guest columnist Jack Danahy of Ounce Labs.

Secure Software Begins in the Development Process


By

Ed Adams

| CIO Insights Article Published June 28, 2006
Deploying highly-secure software applications begins in the beginning, writes CIO Update columnist Ed Adams of Security Innovation.

Security By Design


By

Ed Adams

| CIO Insights Article Published November 30, 2005
In just five steps you can have more secure code, writes Ed Adams of Security Innovation.

Why is Application Security so Elusive?


By

Ed Adams

| CIO Insights Article Published September 13, 2005
Ever wonder why it is so difficult to get your hands on high-quality applications? CIO Update guest columnist Ed Adams of Security Innovation has a few answers.