Stories by Sarah D. Scalet

How to build physical security into a data center

There are plenty of complicated documents that can guide companies through the process of designing a secure data center--from the gold-standard specs used by the federal government to build sensitive facilities like embassies, to infrastructure standards published by industry groups like the Telecommunications Industry Association, to safety requirements from the likes of the National Fire Protection Association. But what should be the CSO's high-level goals for making sure that security for the new data center is built into the designs, instead of being an expensive or ineffectual afterthought?

Sarah D. Scalet | 01 Apr | Read more

This Is (Not Quite) a Test

A tabletop exercise is a great way to get business continuity off the written page without the interruption of a full-scale drill. Rather than actually simulating a disaster, the crisis management group gathers for three hours to talk through a simulated disaster.

Sarah D. Scalet | 07 Feb | Read more

Pipe cleaners: How telcos are managing to deliver 'clean' traffic

From AT&T's Global Network Operations Center 40 miles west of New York City, CISO Ed Amoroso has as wide a window into the Internet as anyone. With a glance at a two-story wall covered with computer monitors and television screens, Amoroso can tell at any given moment how much e-mail, Web and voice-over-IP traffic is streaming across AT&T's data networks, buzzing its way from business to business, person to person.

Sarah D. Scalet | 02 Aug | Read more

What banks say about their online security

By the end of 2006, U.S. banks were supposed to have implemented "strong authentication" for online banking--in other words, they needed to put something besides a user name and password in between any old Internet user and all the money in a customer's banking account.

Sarah D. Scalet | 13 Jun | Read more

Mr. Safety keeps watch on MySpace security

It was late August, and depending on whom you asked, MySpace was either a Web 2.0 prophet or the devil gone digital. While the business world was reading about the social networking site's US$900 million deal with Google, its expansion into Australia and its mention on Time's list of the 50 coolest websites, the security community was riveted by a different set of headlines. "Two teens arrested in MySpace hack," read one. "Three teens accused of sexually assaulting girl they met on MySpace.com," read another. A third: "Man accused of raping MySpace date."

Sarah D. Scalet | 08 Mar | Read more

When to shred documents

When Hewlett-Packard's overzealous investigation into boardroom leaks hit the news last year, many people were shocked -- shocked! -- to hear that the tech giant may have hired third-party investigators to go through individuals' trash. In fact, Dumpster diving is a favorite technique of investigators, and depending on the circumstances -- such as local laws and whether trash pickup occurs on public property -- it is often legal.

Sarah D. Scalet | 24 Jan | Read more

Planning for Pandemic

The potential human toll of a bird flu pandemic is hard enough to contemplate, but the possible economic impact is also vast. CSOs (and all continuity planners) need to think ahead to keep their organizations -- and the economy at large -- working to the greatest extent possible.

Sarah D. Scalet | 07 Feb | Read more

Spinning the Wheel of Misfortune

When Michael Chertoff took over 11 months ago as the secretary of the Department of Homeland Security, he vowed that the department would adopt a risk-based approach. No one really argued. It made sense to focus resources on the country's biggest risks.

Sarah D. Scalet | 04 Jan | Read more

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release