Enterprise Security

4e21f96122846f32545687ad42b271e2

Giving information security a KISS!

May 25, 2010 Added by:Security Ninja

The KISS I’m talking about giving to information security is the KISS principle: Keep It Short and Simple (or Keep It Simple Stupid)

Comments  (6)

34aa54ea9abbb1073d2ff4a687f72243

Defining Identity Standards and the Cloud

May 22, 2010 Added by:Lauren Twele

With the formation of the Open Identity Exchange and OASIS Identity in the Cloud TC there is a renewed interest in Identity Management Standards and a new focus on the Cloud model. This has led to some recent discussions such as "What standards to use?", "How to derive value from standards (old and new)?", and "What resources to leverage in delivering standard...

Comments  (1)

99edc1997453f90eb5ac1430fd9a7c61

Reasons to love infosec

May 22, 2010 Added by:Javvad Malik

Infosec sometimes unfairly gets a lot of bad press for being a barrier to business goals and objectives. How infosec professionals don’t understand business needs and drivers. How pouring money into security is about as good as burning it. But infosec has improved the quality of working and the lives of workers the world over.

Comments  (0)

91648658a3e987ddb81913b06dbdc57a

ALL Security is Local

May 22, 2010 Added by:Ron Baklarz

Thomas P. O’Neill, former speaker of the US House of Representatives Tip O’Neill’s father, once said that “all politics is local.”  He postulated this axiom upon his son’s experiencing his first, and last, political loss.  What the wise father was advising his son was that he needed to be aware of and work harder on the political issues in his ow...

Comments  (0)

6d117b57d55f63febe392e40a478011f

CFOs Need To Sober Up to Security Realities

May 19, 2010 Added by:Anthony M. Freed

For many organizations, network security issues are still considered technical cost-centers that are approached from the standpoint of compliance and the anticipated return on investment, with little consideration of the very real threat to overall enterprise risk.

Comments  (9)

99edc1997453f90eb5ac1430fd9a7c61

Why do you work in Infosec?

May 19, 2010 Added by:Javvad Malik

I was at a social event the other day and got chatting to a few people sat around my table. People are curious creatures, so the topic of conversation quickly moves onto what you do for a living. I tend to adopt a formula to determine if they are worth continuing having a conversation with. A lot of times people reply with "oh I work in banking". So I take a look at them, T.M Lewin ...

Comments  (6)

959779642e6e758563e80b5d83150a9f

Standardize Screening for Network Security Risks

May 18, 2010 Added by:Danny Lieberman

Best practices for data security are still evolving – as there are no industry-standard data security metrics and a confusing array of regulatory compliance and industry standards – PCI DSS 1.2, Sarbanes-Oxley, FISMA, ISO2700x – just to name a few.

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Becoming the ultimate CISO

May 18, 2010 Added by:Javvad Malik

Every organisation has one. The ones that don’t; definitely need one. We’re talking about a Chief Information Security Officer. The alpha dog of security professionals within any given organisation. The person who sits at the board and convinces all them other executives to make sure the company protects their and their customers information.

Comments  (5)

E973b16363b3de77b360563237df7e32

Impact of Online Intelligence Searches part II

May 17, 2010 Added by:Bozidar Spirovski

In our previous article - "Open Source Intelligence Operations" we looked at the generic process of information gathering. But what is this process looking for? The answer to this question is important to all parties..

Comments  (0)

F230c4cd39d680d4cde59248861bdf9d

Data Mining Analysis vs. Predictive Modeling

May 16, 2010 Added by:Michael O'Connor

Fraud prevention and risk management professionals are familiar with both data mining/analysis and predictive modeling as tools of the trade, and the two are often discussed in conjunction with each other.

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

A history of bot fraud

May 16, 2010 Added by:Javvad Malik

Back in the old days before computers were invented or the Internet was discovered, everything was black and white and there were good guys and bad guys. The bad guys back in the day weren’t too different from those of today. Yeah sure they chewed tobacco, but their motives were the same, they wanted power and money.

Comments  (0)

924ce315203c17e05d9e04b59648a942

Cybersecurity Act of 2010 is Bad Medicine

May 15, 2010 Added by:Richard Stiennon

There are a bunch of cybersecurity bills trickling through Congress right now; some of them several years in the making. Senator Rockefeller’s Cybersecurity Act of 2010(S.773) is deemed the most likely to get voted on by the Senate as it was just unanimously passed through the Senate Committee that he chairs, Commerce Science and Transportation.  

Comments  (2)

1f2f664e68a603b3c54890fbbcd37857

Internet Legislation and Piracy

May 14, 2010 Added by:Mark Gardner

Net Neutrality in the US and the Digital Economy Act in the UK are attempts by Governments to start to legislate the Internet.Certainly the Digital Economy Act in the UK was written to prevent the piracy of film, music, photography etc. For what it's worth I don't agree with the measures in the Act, which gives the Government power to checktraffic and potentially block sites&nb...

Comments  (0)

72cc4c5e6cbde70aa374bf94076ad722

Why Corporate Secrets Must be Protected.

May 14, 2010 Added by:Peter Abatan

I recently read the Forrester Thought Leadership paper called “The Value of Corporate Secrets – How Compliance and Collaboration Affect Enterprise Perceptions of Risk”. I found the content very interesting as it gave me a further insight into how organisations think. So here is what I learnt from this paper. The bulk stops with the CISO when it comes to information security

Comments  (0)

6d117b57d55f63febe392e40a478011f

Education Sector is Failing Security

May 13, 2010 Added by:Anthony M. Freed

“The Social Security numbers of about 30,000 people became vulnerable after malicious software attacked Penn State University computers,” announced the headlines in December 2009. “Other data breaches occurred in January and February and in December 2008. One targeted a single computer; the two others affected hundreds of individuals.”

Comments  (21)

6d117b57d55f63febe392e40a478011f

Interview with Tony Agresta, VP of Marketing for Centrifuge

May 12, 2010 Added by:Anthony M. Freed

With data sources growing exponentially and competitive pressures at an all time high, the need to synthesize and extract meaning is critical to success. Centrifuge provides businesses with the freedom to explore data, uncover new insight and improve decision-making.

Comments  (0)

Page « < 72 - 73 - 74 - 75 - 76 > »
Most Liked