Jan 302012

Hardly a day goes by without some security issue, information or identity theft event making the news. In this age of increased threat and reduced budgets, devising an enterprise approach to security architecture and ensuring security in an Enterprise 3.0 world is imperative for organizations to protect their valuable information assets.

The April 2012 Cutter IT Journal, with Guest Editor Mike Rosen, will address enterprise security architecture from a practice-based perspective. Please send us your ideas – proposals of interest are due 8 February 2012.

To respond, please visit


 Leave a Reply



You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>