Enterprise Security


Giving information security a KISS!

May 25, 2010 Added by:Security Ninja

The KISS I’m talking about giving to information security is the KISS principle: Keep It Short and Simple (or Keep It Simple Stupid)

Comments  (6)


Defining Identity Standards and the Cloud

May 22, 2010 Added by:Lauren Twele

With the formation of the Open Identity Exchange and OASIS Identity in the Cloud TC there is a renewed interest in Identity Management Standards and a new focus on the Cloud model. This has led to some recent discussions such as "What standards to use?", "How to derive value from standards (old and new)?", and "What resources to leverage in delivering standard...

Comments  (1)


Reasons to love infosec

May 22, 2010 Added by:Javvad Malik

Infosec sometimes unfairly gets a lot of bad press for being a barrier to business goals and objectives. How infosec professionals don’t understand business needs and drivers. How pouring money into security is about as good as burning it. But infosec has improved the quality of working and the lives of workers the world over.

Comments  (0)


ALL Security is Local

May 22, 2010 Added by:Ron Baklarz

Thomas P. O’Neill, former speaker of the US House of Representatives Tip O’Neill’s father, once said that “all politics is local.”  He postulated this axiom upon his son’s experiencing his first, and last, political loss.  What the wise father was advising his son was that he needed to be aware of and work harder on the political issues in his ow...

Comments  (0)


CFOs Need To Sober Up to Security Realities

May 19, 2010 Added by:Anthony M. Freed

For many organizations, network security issues are still considered technical cost-centers that are approached from the standpoint of compliance and the anticipated return on investment, with little consideration of the very real threat to overall enterprise risk.

Comments  (9)


Why do you work in Infosec?

May 19, 2010 Added by:Javvad Malik

I was at a social event the other day and got chatting to a few people sat around my table. People are curious creatures, so the topic of conversation quickly moves onto what you do for a living. I tend to adopt a formula to determine if they are worth continuing having a conversation with. A lot of times people reply with "oh I work in banking". So I take a look at them, T.M Lewin ...

Comments  (6)


Standardize Screening for Network Security Risks

May 18, 2010 Added by:Danny Lieberman

Best practices for data security are still evolving – as there are no industry-standard data security metrics and a confusing array of regulatory compliance and industry standards – PCI DSS 1.2, Sarbanes-Oxley, FISMA, ISO2700x – just to name a few.

Comments  (0)


Becoming the ultimate CISO

May 18, 2010 Added by:Javvad Malik

Every organisation has one. The ones that don’t; definitely need one. We’re talking about a Chief Information Security Officer. The alpha dog of security professionals within any given organisation. The person who sits at the board and convinces all them other executives to make sure the company protects their and their customers information.

Comments  (5)


Impact of Online Intelligence Searches part II

May 17, 2010 Added by:Bozidar Spirovski

In our previous article - "Open Source Intelligence Operations" we looked at the generic process of information gathering. But what is this process looking for? The answer to this question is important to all parties..

Comments  (0)


Data Mining Analysis vs. Predictive Modeling

May 16, 2010 Added by:Michael O'Connor

Fraud prevention and risk management professionals are familiar with both data mining/analysis and predictive modeling as tools of the trade, and the two are often discussed in conjunction with each other.

Comments  (0)


A history of bot fraud

May 16, 2010 Added by:Javvad Malik

Back in the old days before computers were invented or the Internet was discovered, everything was black and white and there were good guys and bad guys. The bad guys back in the day weren’t too different from those of today. Yeah sure they chewed tobacco, but their motives were the same, they wanted power and money.

Comments  (0)


Cybersecurity Act of 2010 is Bad Medicine

May 15, 2010 Added by:Richard Stiennon

There are a bunch of cybersecurity bills trickling through Congress right now; some of them several years in the making. Senator Rockefeller’s Cybersecurity Act of 2010(S.773) is deemed the most likely to get voted on by the Senate as it was just unanimously passed through the Senate Committee that he chairs, Commerce Science and Transportation.  

Comments  (2)


Internet Legislation and Piracy

May 14, 2010 Added by:Mark Gardner

Net Neutrality in the US and the Digital Economy Act in the UK are attempts by Governments to start to legislate the Internet.Certainly the Digital Economy Act in the UK was written to prevent the piracy of film, music, photography etc. For what it's worth I don't agree with the measures in the Act, which gives the Government power to checktraffic and potentially block sites&nb...

Comments  (0)


Why Corporate Secrets Must be Protected.

May 14, 2010 Added by:Peter Abatan

I recently read the Forrester Thought Leadership paper called “The Value of Corporate Secrets – How Compliance and Collaboration Affect Enterprise Perceptions of Risk”. I found the content very interesting as it gave me a further insight into how organisations think. So here is what I learnt from this paper. The bulk stops with the CISO when it comes to information security

Comments  (0)


Education Sector is Failing Security

May 13, 2010 Added by:Anthony M. Freed

“The Social Security numbers of about 30,000 people became vulnerable after malicious software attacked Penn State University computers,” announced the headlines in December 2009. “Other data breaches occurred in January and February and in December 2008. One targeted a single computer; the two others affected hundreds of individuals.”

Comments  (21)


Interview with Tony Agresta, VP of Marketing for Centrifuge

May 12, 2010 Added by:Anthony M. Freed

With data sources growing exponentially and competitive pressures at an all time high, the need to synthesize and extract meaning is critical to success. Centrifuge provides businesses with the freedom to explore data, uncover new insight and improve decision-making.

Comments  (0)

Page « < 72 - 73 - 74 - 75 - 76 > »
Most Liked