Learn what's real, what's hype, and what you can do about it
For decades, security experts and their IT peers have battledthe black hats. Yet the threats are as prolific as ever and moresophisticated. Compliance requirements are evolving rapidly andglobalization is creating new technology pressures. Risk mitigationis paramount. What lies ahead?
Doug Howard and Kevin Prince draw upon their vast experience ofproviding security services to many Fortune-ranked companies, aswell as small and medium businesses. Along with their panel ofsecurity expert contributors, they offer real-world experience thatprovides a perspective on security past, present, and future. Somerisk scenarios may surprise you. Some may embody fears you havealready considered. But all will help you make tomorrow's IT worlda little more secure than today's.
Over 50 industry experts weigh in with their thoughts
Review the history of security breaches
Explore likely future threats, including social networkingconcerns and doppelganger attacks
Understand the threat to Unified Communication and Collaboration(UCC) technologies
Consider the impact of an attack on the global financialsystem
Look at the expected evolution of intrusion detection systems,network access control, and related safeguards
Learn to combat the risks inherent in mobile devices and cloudcomputing
Study 11 chilling and highly possible scenarios that mighthappen in the future