{"id":2019,"date":"2003-11-19T00:00:00","date_gmt":"2003-11-19T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/11\/19\/comdex-panel-debates-security-needs\/"},"modified":"2021-12-30T11:40:29","modified_gmt":"2021-12-30T11:40:29","slug":"comdex-panel-debates-security-needs","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/11\/19\/comdex-panel-debates-security-needs\/","title":{"rendered":"Comdex Panel Debates Security Needs"},"content":{"rendered":"<p>Does security have a &#8220;magic number,&#8221; a particular amount of firewalls and authentication protocols past which network administrators can be certain their systems are secure?  Well, no, but that didn&#8217;t prevent security executives from trying to answer the question anyway during a panel called, &#8220;How much security is enough?&#8221;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today, about 40 percent of organizations are well secured, 20 percent are beginning to increase their security expenditures, but a good 40 percent still don&#8217;t really get it.  &#8220;Overall security expenditures have increased by about 10 percent in each of the past three years, and security spending now comprises about 4 percent to 10 percent of a company&#8217;s budget,&#8221; Byrnes said.<\/p>\n<p>&#8220;Companies that were merely secure about five years ago are now looking to do things more efficiently, by remaining secure while cutting costs.&#8221; <\/p>\n<p>Ron Moritz, head of eTrust security products for Computer Associates, said one way companies might do this is by looking for security solutions that cover entire networks and can be centrally managed.  <\/p>\n<p>But all the panelists agree that such a system requires an organization to have a sound security policy.  &#8220;If you don&#8217;t know what&#8217;s going on in your network, you can&#8217;t respond.<\/p>\n<p>More info: [url=http:\/\/www.internetweek.com\/story\/showArticle.jhtml?articleID=16101239]http:\/\/www.internetweek.com\/story\/showArticle.jhtml?articleID=16101239[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2019","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2019","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2019"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2019\/revisions"}],"predecessor-version":[{"id":4506,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2019\/revisions\/4506"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2019"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2019"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}