placeholder
Stuart Gentle Publisher at Onrec

Article available on a security expertís guide to Web 2.0

This short insightful guide has been written by Roger Thornton Fortify Software

This short insightful guide has been written by Roger Thornton Fortify Software CTO and Jennifer Bayuk, formerly CISO of Bear Stearns to give CISOs and other IT security professionals an insight into how to go about protecting your workforce and systems from Web 2.0.

The problem is painfully obvious for the security professional: More complexity and openness creates vulnerabilities and opportunities for attack and the release of confidential information. This all results in more headaches for security professionals who have to be vigilant in order to keep their IT environments secure.
Whatís a CISO to do?
Although some companies have tried all options, you canít easily write your own browser, isolate your users from the Web, or control everything that happens on their PC desktop. However, there are steps you can take that can seriously improve your odds of winning the battle over Web 2.0 vulnerabilities.

In the first of a series of guides, Fortify have outlined some simple steps to take to make sure you stay clear of Web 2.0. vulnerabilities. Iíve made sure that the guides have been stripped of product pushy references, so if you would like to read it with a view to using it first then please email Yvonne@eskenzipr.com or phone on 020 71832 832.