Enterprise Security

B09c361cbdc6cf629affdc7db30a186d

Risk Mitigation through Collaborative Innovation

April 26, 2010 Added by:Steven Fox, CISSP, QSA

Did you innovate today? Let’s say that you did! Good job! Did you get the idea from a podcast or webinar? Maybe. Odds are that you got wind of an interesting idea when you sat with a different team during lunch. Perhaps you attended a presentation by the business analysis group after the cancellation of an audit meeting. In either case, a synergy occured between new and acquired knowledge &n...

Comments  (0)

72cc4c5e6cbde70aa374bf94076ad722

How Enterprise Rights Management could have prevented the 'Serious' data breach at Gwent Police

April 26, 2010 Added by:Peter Abatan

Last week we read about the case of a serious data breach at Gwent Police in the UK where a spreadsheet was mailed to a journalist by mistake. This has led to an investigation by the Independent Police Commission and a possible fine of up to £500,000 by the Information Commissioner's Office. The file sent contained records of thousands of individuals applying for sensitive jobs was mistakenl...

Comments  (0)

6f611188ad4a81ffc2edab83b0705d76

The Secret is Out

April 22, 2010 Added by:Sandra Avery

What's the value of a trade secret?  That super secret special formula, recipe, design, or device that gives companies an edge against copy cats and competitors would appear to be priceless in some cases and extremely well-guarded. 

Comments  (5)

2ca59fd9c3117f138e722e13597f2b0b

Is it really important to have a structured security budget? (part1)

April 22, 2010 Added by:Dario Forte

At the time this post is being written, the dynamics of management's understanding of security issues and the valorization of security investments remain somewhat nebulous. Until this concept is fully interpreted and explored, this valorization is assigned to those in the company who deal with information security. And if they are lucky, they are given a reasonable budget to administrate.

Comments  (2)

509ea0c1f4a210534eb004d35c10aa2d

ISAlliance on Defense Industrial Base Cybersecurity

April 21, 2010 Added by:Marjorie Morgan

More information on the ISA's analysis of the economic impact of cybersecurity issues can be found in a new publication from the ISA and the American National Standards Institute (ANSI), The Financial Management of Cyber Risk: An Implementation Framework for CFOs.

Comments  (1)

924ce315203c17e05d9e04b59648a942

Cold War Holds Lessons for Cyber Strategy

April 21, 2010 Added by:Richard Stiennon

Perhaps in response to rather vocal criticism of his frantic warnings about cyberwar, Mike McConnell, retired Navy Admiral and  one time Director of National Intelligence, published a position piece in The Washington Post. He draws on the Cold War to support his thesis that the US must do more to counter cyber threats.  Here is my take on his comments.

Comments  (0)

85ac6feb584b665e85664974c546cfec

5 Tips to Strengthen Network Security with Limited Budgets

April 16, 2010 Added by:Ray Tan

Nowadays, IT departments are trying to find out ways to strength their network security with limited budgets. Especially small companies, which have even less budget on network security. It is more important for them to know some tips on how to strength their network security with limited budgets. I would like to share you the top 5 tips offered by Jon-Louis Heimerl.

Comments  (4)

6d117b57d55f63febe392e40a478011f

An Interview with U.N. Cybersecurity Expert Raoul Chiesa

April 15, 2010 Added by:Anthony M. Freed

I recently had the pleasure of talking with Raoul Chiesa, OPST, OPSA, and ISECOM Trainer, about international perspectives on cybersecurity issues. Mr. Chiesa is a Senior Advisor on Strategic Alliances & Cybercrime Issues at the Global Crimes Unit for the United Nations Interregional Crime & Justice Research Institute, a Member of the Permanent Stakeholders Group at the European Network &a...

Comments  (0)

49afa3a1bba5280af6c4bf2fb5ea7669

FaaS: Fraud as a Service

April 14, 2010 Added by:Mike Meikle

In working with various clients on the topic of security, a common theme has emerged. Management and employees still labor under the perception that fraud is still the purview of unorganized individuals with an axe to grind against a specific company. 

Comments  (0)

509ea0c1f4a210534eb004d35c10aa2d

Internet Security Alliance Comments on IT Cybersecurity

April 13, 2010 Added by:Marjorie Morgan

We must mitigate the ever-increasing abilities of today's cyber criminals to penetrate the current information security barriers, fire walls, etc. of industry and government organizations in order to gain access to the most sensitive and confidential private information stored in its databases.

Comments  (0)

E376ca757c1ebdfbca96615bf71247bb

eBay: a hacker's source for acquiring remote monitoring medical devices for security testing?

April 13, 2010 Added by:shawn merdinger

I typically check eBay weekly for medical devices showing up, with an eye for anything with a network interface. Bluetooth-enabled devices abound, but the (mis-perception) that an attacker must be physically close decreases popular interest from a security testing perspective. In contrast, it's a box "on the wire" that enables an attacker in say, Palau, to to reach out and provide what I...

Comments  (1)

72cc4c5e6cbde70aa374bf94076ad722

The Delivery of Customer’s Electronic Financial Statements using Enterprise Rights Management.

April 13, 2010 Added by:Peter Abatan

Post has been and is quickly becoming an increasing challenge for many organisations of all sizes. Apart from the security issues of financial data getting lost before delivery, spiralling costs of running mailing centres, postal strikes and the increasing cost of postage, businesses and organisations want to embrace technology as an alternative to using post

Comments  (1)

B09c361cbdc6cf629affdc7db30a186d

I'm not OK - And Why You Should Care

April 10, 2010 Added by:Steven Fox, CISSP, QSA

The SOW just came through on a new client.  You do some research and find that they just cut their staff by 20% – and you are the lucky security professional that gets to do their PCI compliance review!  You file this in the back of your mind as an environmental factor and proceed to prepare for the engagement.  After all, what matters here is the review, right?

Comments  (0)

72cc4c5e6cbde70aa374bf94076ad722

A perspective on the theft of confidential documents by former employee at Ford.

April 09, 2010 Added by:Peter Abatan

When I read that a former Ford product engineer had stolen over 4000 confidential documents containing trade secrets from his former employer, I began to wonder how many companies out there are as vulnerable to the same degree as Ford. Fortunately for Ford this employee got caught, but it remains unknown how many employees have successfully got away without Ford’s knowledge?

Comments  (6)

72cc4c5e6cbde70aa374bf94076ad722

How Does Your Organisation’s Executives Communicate Confidential Information?

April 08, 2010 Added by:Peter Abatan

Trade secrets, executive orders, press briefs, corporate strategies and tactics are all confidential communication tools that could impact the shareholder value of a business. If a press brief is released earlier than is should be, it could cause the net worth of the business to fall. Likewise if an executive communication that is meant for internal use only is released into the public d...

Comments  (0)

Dd9902bc56a9d85cdc62c00083ea4871

AntiMistake Software – Preventing Human Error and Lack of Awareness

April 07, 2010 Added by:Katie Weaver-Johnson

Successful organizations realize antivirus software must be installed on all PCs.  Antivirus software works well if updates are automatic and ongoing (as new risks and threats are identified) to prevent expensive damages to PCs, information and reputations. 

Comments  (1)

Page « < 72 - 73 - 74 - 75 - 76 > »