Security “Czar” Wrote Foreword For TSC CEO Mark Kadrich’s Leading Security Book Endpoint Security
San Jose, CA (PRWEB) January 10, 2010 -- The Security Consortium, (TSC) a leading IT security testing, research and corporate counsel services organization, today announced its support for recently appointed White House cyber-security “czar” Howard Schmidt. A former chief security executive at Microsoft with 31 years' experience in law enforcement and the military, Schmidt is one of the world's leading authorities on computer security according to John Brennan, the White House counter-terrorism advisor. Schmidt also wrote the foreword for the leading security book, Endpoint Security, written by TSC CEO Mark Kadrich.
Similar to the goals Schmidt wants to accomplish in his newly created position, three years ago, Schmidt wrote in the book’s introduction that “moving forward… is the direction that information security needs to move today to have an even more secure cyberspace tomorrow. Moving forward means that we need to continue to innovate and be creative. In the past, people have innovated when they believed that they had a better way of doing something and they thought that they could make a difference. This book (Endpoint Security) is about security innovation – it’s about doing something new and making a difference.”
Published in 2007 by Addison-Wesley, Endpoint Security provides a comprehensive proven approach to securing network endpoints which is where the typical enterprise conducts most of its business. Disruption to these endpoints, a traditional target point for hackers and corporate criminals, can cause a huge impact to enterprises in terms of cost and lost productivity. As a result, today’s organizations are forced by necessity to confront endpoint security as a core business issue.
The cyber security initiatives Schmidt will unveil to secure the country’s way of doing business are described as well in the forward where he wrote “we need new tools if we are to continue to secure our critical infrastructure from those who would do us harm. …How we innovate is going to be the key to success in this battle, and part of that innovation is going to involve looking at things a little differently than how we have in the past.”
In the endpoint security battle, this innovation is revealed in Kadrich’s book where he illustrates a breakthrough strategy on how to protect endpoint devices from attack. Drawing on powerful process control techniques, the text shows how to systematically prevent and eliminate network contamination and infestation, safeguard endpoints against today’s newest threats, and prepare for tomorrow’s attacks. Unlike traditional “one-size-fits-all” solutions, Kadrich’s approach reflects the unique features of every endpoint, from its applications to its environment. Specific, customized strategies are presented on how to protect Windows PCs, notebooks, Unix/Linux workstations, Macs, PDAs, smartphones, cellphones, embedded devices, and more, which is one of the key reasons Schmidt chose to endorse the book.
"Obama has displayed extraordinary vision by appointing Schmidt to this position in order to further the cybersecurity vision displayed in his campaign and the Cyberspace Policy Review unveiled in his May 29, 2009 speech,” said Mark Kadrich, TSC founder and CEO. “The power of this appointment will help to drive IT innovation at the highest levels of our government and our industry to take a strategic and proactive approach focused on securing our nation’s digital infrastructure.”
One of the early pioneers in the field of computer forensics and computer evidence collection, Schmidt established the first dedicated computer forensics lab in the government. His other government experience includes working for President George W. Bush as chair of the President's Critical Infrastructure Protection Board, where he reported to Condoleezza Rice, National Security Advisor and Governor Tom Ridge, Director of Homeland Security. In 2002, he helped develop the National Strategy to Secure Cyberspace, the first document of its kind in the government. He is a member of the American Academy of Forensic Scientists and has testified before congressional committees on computer security and cyber crime. He has also been instrumental in the creation of public and private partnerships and information-sharing initiatives. Schmidt previously served as the international president of the Information Systems Security Association (ISSA) where Kadrich currently serves as president of the Silicon Valley chapter.
"Schmidt will be a huge asset to this country," Kadrich continued. "His vast knowledge and understanding of the technology, business, and political issues will help keep the U.S. at the front edge of cyber security, and we are looking forward to working with him in this effort.”
About The Security Consortium:
Design, testing, counsel and leadership services from The Security Consortium (TSC) provide companies with the ability to balance the need for security with business objectives. TSC brings together design, network and product expertise with testing and process feedback to create competitive advantage for companies. By focusing on overall business results instead of narrow test requirements, TSC helps companies improve the processes used to create, purchase, and operate security products. The result is competitive advantage for both buyers and sellers through lower TCO, better quality and usability, fewer security vulnerabilities and more successful deployments. TSC is a privately held company, founded in 2007 and based in San Jose, California.
Further information on TSC is available at www.thesecurityconsortium.net or contact
Robin Lutchansky, Lutchansky Communications at 408/607-7118 or at robinL(at)Lcomm(dot)com.
Copyright © 2009 The Security Consortium, Inc. All rights reserved. TSC, TSC Wireless, The Security Consortium, and other TSC products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of The Security Consortium, Inc. All other product and service names mentioned are trademarks of their respective companies. Information in this document, including data, is for informational purposes only and is subject to change without notice. These materials are provided by The Security Consortium and its partners or affiliated companies without representation or warranty of any kind, and neither The Security Consortium, its affiliates or partners will be liable for any errors or omissions. The only warranties for The Security Consortium products or services are those set forth in the express warranty statements accompanying such products or services, if any.
# # #
Read the full story at http://www.prweb.com/releases/2010/01/prweb3428714.htm.
Copyright©2010 Vocus, Inc.
All rights reserved