Latest Blog Posts


Culture Eats Strategy for Lunch

April 13, 2010 Added by:Katie Weaver-Johnson

Culture is most commonly defined as the behaviors and beliefs characteristic of a group of people.  So an organization’s culture of behaviors and beliefs are what shape the decisions people make and results an organization achieves.

Comments  (3)


Is Social Engineering being overlooked as a modern day security threat?

April 13, 2010 Added by:Michael Bruck

Organizations are more often asking to include a social engineering evaluation, but it still surprises me just how many of them have not previously had a formal SE evaluation process in place until we do our first audit with them. I get “oh, our accounting firm calls into our user base from time to time” or “our outsourced network support vendor has tried to get confidential user...

Comments  (1)


Chris Powers: HP's Worldwide Director of Enterprise Storage

April 13, 2010 Added by:Rahul Neel Mani

Chris Powers, Worldwide Director, Enterprise Storage, HP StorageWorks Division spoke to Rahul Neel Mani about HP’s latest push – ‘Storage and Server Convergence’ – as well as other technologies that will excite enterprise users in 2010-11.

Comments  (0)


Internet Security Alliance Comments on IT Cybersecurity

April 13, 2010 Added by:Marjorie Morgan

We must mitigate the ever-increasing abilities of today's cyber criminals to penetrate the current information security barriers, fire walls, etc. of industry and government organizations in order to gain access to the most sensitive and confidential private information stored in its databases.

Comments  (0)


eBay: a hacker's source for acquiring remote monitoring medical devices for security testing?

April 13, 2010 Added by:shawn merdinger

I typically check eBay weekly for medical devices showing up, with an eye for anything with a network interface. Bluetooth-enabled devices abound, but the (mis-perception) that an attacker must be physically close decreases popular interest from a security testing perspective. In contrast, it's a box "on the wire" that enables an attacker in say, Palau, to to reach out and provide what I...

Comments  (1)


The Delivery of Customer’s Electronic Financial Statements using Enterprise Rights Management.

April 13, 2010 Added by:Peter Abatan

Post has been and is quickly becoming an increasing challenge for many organisations of all sizes. Apart from the security issues of financial data getting lost before delivery, spiralling costs of running mailing centres, postal strikes and the increasing cost of postage, businesses and organisations want to embrace technology as an alternative to using post

Comments  (1)


A New Communications Protocol

April 12, 2010 Added by:Bill Wildprett, CISSP, CISA

As information security professionals, a common refrain we hear is how difficult, but essential it is to communicate the whys, hows, and whats of security to management, other business units, partners, vendors, customers, etc.,  Whether its meaningful security metrics or why compliance is just the beginning of the whole security process, better communication can yield better resul...

Comments  (0)


Zuckerburg: Privacy is No Longer a Social Norm

April 12, 2010 Added by:Theresa Payton

Are you one of the over 350 Million people that use Facebook to keep in touch with friends and family? According to Hitwise, Facebook briefly surpassed Google as the most visited site in the world during the Christmas season. The founder of Facebook said that privacy is no longer a social norm.

Comments  (2)


I'm not OK - And Why You Should Care

April 10, 2010 Added by:Steven Fox, CISSP, QSA

The SOW just came through on a new client.  You do some research and find that they just cut their staff by 20% – and you are the lucky security professional that gets to do their PCI compliance review!  You file this in the back of your mind as an environmental factor and proceed to prepare for the engagement.  After all, what matters here is the review, right?

Comments  (0)


10 Personal Safety and Security Tips

April 10, 2010 Added by:Robert Siciliano

Fundamentals: Body language is 55% of communications. That’s your walk, posture, facial expressions and eye contact. Awareness is being alert to your surroundings at all times. Intuition is when the hair on the back of your neck stands on end. Voice tone and pitch equal 35% of communications. The way a person communicates physically and verbally can determine whether or not a predator deems ...

Comments  (6)


A perspective on the theft of confidential documents by former employee at Ford.

April 09, 2010 Added by:Peter Abatan

When I read that a former Ford product engineer had stolen over 4000 confidential documents containing trade secrets from his former employer, I began to wonder how many companies out there are as vulnerable to the same degree as Ford. Fortunately for Ford this employee got caught, but it remains unknown how many employees have successfully got away without Ford’s knowledge?

Comments  (6)


ISAlliance Expresses Tentative Support for Cyber Legislation

April 08, 2010 Added by:Marjorie Morgan

On Wednesday, March 24, the Senate Commerce Committee became the first Congressional Committee to approve a comprehensive cybersecurity bill. The "kill-switch" provision (turning off the Internet) and federally mandated technical standards on the private sector have been eliminated from earlier versions of the legislation and the bill now embraces private sector standards and market incentiv...

Comments  (0)


Vector 2 Data Sanitizing

April 08, 2010 Added by:Mark Bennett

Ever wonder if the data on your hard drive is recoverable after a format? Thinking about throwing out that old hard disk you don't need anymore? Perhaps selling the computer on EBAY? You lost a USB stick at the supermarket, but you think you are ok because you deleted the data previously? THINK AGAIN!

Comments  (0)


New Regulations Will Not Prepare the US for Cyberwar

April 08, 2010 Added by:Richard Stiennon

Senators Rockefeller and Snowe have formulated a new Cybersecurity bill that they describe in today’s Wall Street Journal.  (Use Google news to get to the full article.)  The Bill as proposed will be very disruptive to the operations of every business and will do essentially nothing to prepare the US for cyberwar.

Comments  (0)


How Does Your Organisation’s Executives Communicate Confidential Information?

April 08, 2010 Added by:Peter Abatan

Trade secrets, executive orders, press briefs, corporate strategies and tactics are all confidential communication tools that could impact the shareholder value of a business. If a press brief is released earlier than is should be, it could cause the net worth of the business to fall. Likewise if an executive communication that is meant for internal use only is released into the public d...

Comments  (0)


Fed Guidelines for Social Media Review part II

April 07, 2010 Added by:Mike Meikle

I promised in my last post to walk you through the various supporting documents that are tied to the Feds’ Social Media Guidelines.  Also, I will act as translator for all the corporate/government  speak.   This way lies madness, abandon all hope ye who enter, etc.

Comments  (0)

« First < Previous | 469 - 470 - 471 - 472 - 473 | Next > Last »