Guest Columns

CEOs: Beware Of Spear-Phishing

DETROIT - By now, most e-mail users are wise to the scam of phishing - sending a spoofed e-mail message that appears to be from a legitimate business, such as a bank, which directs the recipient to a fake web site seeking verification of personal information such as passwords or credit card numbers. A new

By |2008-05-09T00:00:00-04:00May 9th, 2008|Archive, Guest Columns|

Websense Discovers New Mass Attack Infecting Reputable Sites

SAN DIEGO - Websense Security Labs discovered a new Chinese attack method that has infected hundreds of thousands of reputable websites where users are automatically redirected to a malicious site that installs a keylogger to capture sensitive information. According to Stephan Chenette, manager of Websense Security Labs, these attacks are originating from China and have

By |2008-04-29T00:00:00-04:00April 29th, 2008|Archive, Guest Columns|

IBM Offers Partners New Tools And Incentives For Targeting Mid-Sized Businesses

NEW YORK - IBM is beefing up its service offerings for mid-sized businesses with new security and productivity solutions along with new tools and incentives to support partner growth in the mid-market space. "The latest Express Advantage offerings address some of the biggest pain points that our customers face and IBM's continued expansion of its

By |2008-04-29T00:00:00-04:00April 29th, 2008|Archive, Guest Columns|

Patent or Trade Secret? Changing Times Call For Re-Evaluation of Intellectual Property Strategies

ANN ARBOR - The environment for obtaining patents is changing, thanks in part to the April 2007 Supreme Court ruling in KSR International Co. v Teleflex Inc. (KSR), which essentially makes patents more difficult to obtain and enforce. Other movements are afoot that seek to broaden the rule-making authority of the U.S. Patent and Trademark

By |2008-04-18T00:00:00-04:00April 18th, 2008|Archive, Guest Columns|

Strategic Security: The Evolving Role of the Security Professional

SAN FRANCISCO - I am going to talk about security, but more specifically, I am going to explore the evolving role of the security professional. In some organizations the senior security person is called the Chief Security Officer. Other companies use different titles?Vice President, Enterprise Security; CISO (chief information security officer); VP Security & Compliance,

By |2008-04-18T00:00:00-04:00April 18th, 2008|Archive, Guest Columns|

Michigan Manufacturers Association Outlines 2008 Public Policy Agenda

LANSING - The Michigan Manufacturers Association has released its 2008 public policy agenda outlining policies and reforms that the association believes can strengthen Michigan's manufacturing community and, in turn, move the state out of its economic doldrums. The 2008 Michigan Manufacturing Agenda calls for substantial government reforms, specifically addressing critical changes that must be made

By |2008-04-14T00:00:00-04:00April 14th, 2008|Archive, Guest Columns|

HP Outlines Software Strategy

PALO ALTO, Ca. - Helping chief information officers perform their job better with an array of new management tools at hand is the primary goal of HP Software, Thomas Hogan, senior vice president at HP Software, recently told a group of reporters in Toronto. "What we are here to do is help the CIO drive

By |2008-04-01T00:00:00-04:00April 1st, 2008|Archive, Guest Columns|

White Paper: An Immersion Program to Help Students Understand the Impact of Cross Cultural Differences in Information Assurance Work

DETROIT ? The topic of this article is best summed up in an observation by Judith Olson; "When in Rome, do as the Romans. But in a today's groupware-supported environment, the question is, Where is Rome?" In effect, globalization and the attendant demand for multicultural teamwork has placed a new emphasis on the ability for

By |2008-03-28T00:00:00-04:00March 28th, 2008|Archive, Guest Columns|