- Anti-terrorism rules may create new requirements for allowing government access to private data resources. Design systems now to meet possible legal demands without compromising competitive intelligence.
- Web services will streamline deployment of enterprise database clients to wireless handhelds. Act now to define data access privileges and anticipate wireless security vulnerabilities.
- Emerging digital rights management standards impose data-stream encryptions that may complicate virus scanning and other security techniques. Work proactively with security tool providers to maintain capabilities.
- European anti-hacking statutes under consideration could criminalize the use of current vulnerability scanning tools. Monitor progress of such proposals in countries where your organization does business and identify best locations for worldwide network management centers.
Heads Up - 3
Modernizing Authentication — What It Takes to Transform Secure Access