Enterprise Security


How to get certified against ISO 27001?

June 23, 2010 Added by:Dejan Kosutic

You have been implementing ISO 27001 for quite a long time, invested quite a lot in education, consultancy and implementation of various controls. Now comes the auditor from a certification body - will you pass the certification?

Comments  (1)


State of International Cooperation on Cybercrime

June 23, 2010 Added by:Simon Heron

Last week’s Talinn conference was the latest in a series of international gatherings to discuss cybercrime. Unfortunately, although international cooperation is an essential element in defeating cybercrime, these discussions have so far been unable to find an actionable agreement.

Comments  (0)


Battling the Information Security Paradox

June 22, 2010 Added by:Anthony M. Freed

Information security is still not garnering appropriate attention from the executive level at some of the largest companies in the world, many of whom are engaged in business activity considered critical to the nation's infrastructure.

Comments  (1)


ISAlliance Priority Projects for 2010

June 22, 2010 Added by:Marjorie Morgan

In conjunction with the American National Standards Institute (ANSI), ISA published its first handbook for enterprises which examines corporate cyber security from an economic perspective as much as the technical one.

Comments  (0)


Does SaaS Diminish the Need for Enterprise Architecture?

June 22, 2010 Added by:Lauren Twele

This is a good question, but we have to understand what is meant by Enterprise Architecture (EA). It is generally accepted to be a discipline and sometimes a role or organization responsible for those activities that strategically align an organization to its technology and business goals.

Comments  (0)


SIEM and Log Management

June 21, 2010 Added by:Anton Chuvakin

A few weeks ago week I did this fun webcast with NitroSecurity (recording) on Log Management and SIEM; here are some belated Q&A we got there:

Comments  (0)


CIOs: Shunning Primitive Application Infrastructure

June 21, 2010 Added by:Rahul Neel Mani

It is high time the CIOs should look at modernising their application infrastructure and move on to cost-effective and faster platforms. In an exclusive conversation, Stuart McGill, CTO, Micro Focus shares his thoughts with Rahul Neel Mani.

Comments  (0)


Responding to a Compromised System Alert

June 19, 2010 Added by:Brent Huston

I interact with a lot of people and organizations that have compromised machines. Often, my email or phone call is the first they have heard of the problem. Should you ever get a call like this from me or someone else, here are a few tips that you might find helpful for proceeding.

Comments  (0)


A Cynics guide to Infosec Consultancy

June 18, 2010 Added by:Javvad Malik

So you want to be an infosec consultant? If you’re like most guys, its better you consider a career in risk management or audit. Or maybe you’ve already got some variation of “security” in your job title but are stuck in a rut. Results are coming slowly and career progression is almost non-existent. What you need is a dose of cynic motivation to deliver a swift kick in the ...

Comments  (2)


You Have an Emergency Notification System…OK, Then What?

June 17, 2010 Added by:Katie Weaver-Johnson

I recently came across a blog in Emergency Management Magazine discussing the need to use multiple forms of emergency notifications.  Lessons learned and recent studies reveal that the public won’t likely take action unless they receive their directions from at least two trusted sources.  A study on evacuations during the San Diego wildfires found that residents generally wouldn&rs...

Comments  (1)


Cyberwar Debate Rages On

June 16, 2010 Added by:Richard Stiennon

In 2001 Ralph Bendrath, a German cyber security writer and researcher, wrote a report that dug into the efficacy of the use of the term cyberwar. His report is remarkable in that most of what he covers ten years ago represents today’s state of affairs.

Comments  (0)


Next Generation Risk Analysis

June 15, 2010 Added by:Danny Lieberman

I believe that there is a fundamental flaw in  enterprise risk management systems –  they don’t really tell the organization something it doesn’t already know and if we don’t bring some fresh input and new risk intelligence to the board room,we are not going to be very effective at mitigating new threats.

Comments  (0)


How Do You Get The Best SIEM?

June 15, 2010 Added by:Anton Chuvakin

Some security technologies – like network firewalls - are getting pretty darn close to being commoditized and differences between products are ever-so-close to being wiped out. SIEM, let me tell you, is nowhere near this.

Comments  (0)


Breaking Down Network Barriers

June 15, 2010 Added by:Rahul Neel Mani

Steven Leonard, President Asia Pacific/Japan, EMC Corporation, spoke to Rahul Neel Mani at length about the company’s latest vision  — 'Global Storage Federation' and other areas which will take EMC to the next level of growth.

Comments  (0)


ISAlliance Presents at Congressional Cybersecurity Event

June 15, 2010 Added by:Marjorie Morgan

Internet Security Alliance President Larry Clinton and ISA Board Member, Jeff Brown, Raytheon, Director of Infrastructure Services and Chief Information Security Officer will take part in a forethcoming Congressional Cybersecurity Caucus Event.

Comments  (0)


Five Tips for Successful Business Impact Analysis

June 15, 2010 Added by:Dejan Kosutic

You have probably wondered why you have to perform business impact analysis (BIA) once you already did the risk assessment. You identified all the risks, didn’t you? Spent quite a lot of time analyzing your company, why then yet another analysis? Well, the purpose of BIA is different.

Comments  (3)

Page « < 72 - 73 - 74 - 75 - 76 > »