Enterprise Security

509ea0c1f4a210534eb004d35c10aa2d

ISAlliance Presents at Congressional Cybersecurity Event

June 15, 2010 Added by:Marjorie Morgan

Internet Security Alliance President Larry Clinton and ISA Board Member, Jeff Brown, Raytheon, Director of Infrastructure Services and Chief Information Security Officer will take part in a forethcoming Congressional Cybersecurity Caucus Event.

Comments  (0)

9259e8d30306ac2ef4c5dd1936e67634

Five Tips for Successful Business Impact Analysis

June 15, 2010 Added by:Dejan Kosutic

You have probably wondered why you have to perform business impact analysis (BIA) once you already did the risk assessment. You identified all the risks, didn’t you? Spent quite a lot of time analyzing your company, why then yet another analysis? Well, the purpose of BIA is different.

Comments  (3)

6d117b57d55f63febe392e40a478011f

No Internet Kill Switch is No Guarantee

June 13, 2010 Added by:Anthony M. Freed

In continued efforts to centralize the cybersecurity authority within the White House, more than 40 bills have been introduced that will dramatically alter the balance of power between the government and the private sector. Protecting Cyberspace as a National Asset Act of 2010 will shift the responsibility of federal agency cybersecurity from the Office of Management and Budget (OMB) to DHS by cre...

Comments  (3)

99edc1997453f90eb5ac1430fd9a7c61

Most annoying consultants

June 13, 2010 Added by:Javvad Malik

Infosec would have a better reputation if all consultants were perfect like me. When speaking to a project manager, we should have completed our research. Scoured the internet, finding out what a particular application does and how many security vulnerabilities are out there. The list goes on, but suffice to say a good consultant always does their homework before they actually start talking t...

Comments  (3)

E973b16363b3de77b360563237df7e32

Selecting a Disaster Recovery Center Location

June 12, 2010 Added by:Bozidar Spirovski

When preparing a Disaster Recovery Center, one of the most important decisions is the location of the location of the Disaster Recovery Center. Up until the 9/11, a lot of companies held their DR centers in the adjacent building, and right after 9/11, everyone wanted to go as far from the primary data center as possible.

Comments  (2)

509ea0c1f4a210534eb004d35c10aa2d

DHS Cyber Security Resources Catalog

June 12, 2010 Added by:Marjorie Morgan

The Department of Homeland Security (DHS) has released a "Private Sector Resources Catalog" collecting training, publications, guidance, alerts, newsletters, programs, and services available to the private sector. This is the first such effort to encompass all of DHS and represents a commitment to facilitate public access and increase transparency.

Comments  (0)

192a6e6df92a5ebd88de9b476fdd350d

Computer Security or Information Security? What are we talking about?

June 10, 2010 Added by:Jorge Mieres

I usually receive consultations in which, conceptually speaking, there is a notable confusion about the difference between computer security and information security. Therefore, we will try to clarify the issue in question.

Comments  (1)

99edc1997453f90eb5ac1430fd9a7c61

Choosing an Infosec Consultancy

June 09, 2010 Added by:Javvad Malik

First off you need to decide why you actually need an infosec consultancy. Is it because the work can't be done in-house? Or there are confidentiality issues? Or someone at the golf course just mentioned how their infosec team can sort out all of your problems?

Comments  (1)

6d117b57d55f63febe392e40a478011f

PineApp CEO Hezi Erez: Recession Threatens Security

June 08, 2010 Added by:Anthony M. Freed

I recently had the opportunity to discuss enterprise security issues with Hezi Erez, CEO at PineApp, a leading security solution provider for Information Technology. Mr. Erez is a 1986 graduate of the Technion, the Israel Institute of Technology, and he specializes in telecommunication, microelectronics, computers and optics, and Mr. Erez has 20 years of extensive experience as an executive in Hi-...

Comments  (0)

9259e8d30306ac2ef4c5dd1936e67634

Similarities and differences between ISO 27001 and BS 25999-2

June 08, 2010 Added by:Dejan Kosutic

At first glance, information security and business continuity don’t have much in common – some would add that the only similarity is that they are both about IT.Information security management is best defined in the International standard ISO/IEC 27001, while business continuity management is defined in the British standard BS 25999-2 – therefore, if we want to compar...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Choosing Endpoint DLP Agents

June 07, 2010 Added by:Danny Lieberman

There is a lot to be said for preventing data loss at the point of use but if you are considering endpoint DLP (data loss prevention), I recommend against buying and deploying an integrated DLP/Anti-virus end-point security agent.  This is for 4 reasons:

Comments  (2)

91648658a3e987ddb81913b06dbdc57a

Don't Ask..Don't Yell

June 07, 2010 Added by:Ron Baklarz

In case you have not been following the current slew of cyber security-related legislation that has been penned during the 111th Congress, there are currently 35 different laws in various stages of the legislative process.  Melissa Hathaway, former White House cyber security advisor, has recently released a study of these legislations

Comments  (0)

192a6e6df92a5ebd88de9b476fdd350d

Some words about Information Security

June 07, 2010 Added by:Jorge Mieres

Organizations are increasingly dependent on their computer networks and a problem affecting them, no matter how small, can compromise the continuity of operations, a situation which inevitably results in economic loss. An increasing number and complexity of new computer attacks, becoming more specialized skills whose goals are an economic nature for the benefit of the attackers also in the mi...

Comments  (0)

7477d0986a135e5e948d70e9995a609c

What Penetration Testing and patios have in common

June 07, 2010 Added by:John Verry

Had an interesting (and familiar) call with a potential client yesterday regarding a Penetration Testing proposal. "We really like your proposal, but honestly, we are trying to figure out why you are so much cheaper than the other firm that we are looking at ... " 

Comments  (6)

7af56c65866a442699d6dd1dfb02b528

Data-centric security

June 06, 2010 Added by:Eli Talmor

IT security professionals engaged in a game of cat and mouse with hackers as fast as they deploy security countermeasures, these rogue elements discover loopholes or entirely new avenues of attack. Traditional security methods have relied upon closely guarding the perimeter of a company's network.

Comments  (0)

72cc4c5e6cbde70aa374bf94076ad722

Why Enterprise Rights Management software should work on all operating system platforms

June 01, 2010 Added by:Peter Abatan

Google’s decision to start moving away from the Windows operating system because of its vulnerabilities in my opinion represents a seismic shift in the IT industry. Although Google is still silent on this matter, if true many big enterprises will start to look into the feasibility of migrating to other operating systems like Linux, OS X and in the future Chrome OS.

Comments  (5)

Page « < 72 - 73 - 74 - 75 - 76 > »