Enterprise Security

924ce315203c17e05d9e04b59648a942

Carl Levin Poses Several Cyber Scenarios

April 29, 2010 Added by:Richard Stiennon

Today’s hearing on the nominations of Keith Alexander to head CYBERCOM (and Admiral Winnfield to head NORAD and NORTHCOM) were the first time that  operational responsibilities of CYBERCOM have been discussed in a public forum.

Comments  (0)

959779642e6e758563e80b5d83150a9f

On Secure and Agile Collaboration

April 29, 2010 Added by:Danny Lieberman

One of the biggest challenges in global multi-center clinical trials (after enrollment of patients) is collaboration between multi-center clinical trial teams: CRAs, investigators, regulatory, marketing, manufacturing, market research, data managers, statisticians and site administrators.

Comments  (1)

509ea0c1f4a210534eb004d35c10aa2d

Congressional Briefing: The Economics of Cybersecurity

April 26, 2010 Added by:Marjorie Morgan

On May 7, 2010, the Internet Security Alliance (ISA) and the American National Standards Institute (ANSI) will brief members of Congress and their staff on their new publication, The FinancialManagement of Cyber Risk: An Implementation Framework for CFOs.

Comments  (0)

B09c361cbdc6cf629affdc7db30a186d

Risk Mitigation through Collaborative Innovation

April 26, 2010 Added by:Steven Fox, CISSP, QSA

Did you innovate today? Let’s say that you did! Good job! Did you get the idea from a podcast or webinar? Maybe. Odds are that you got wind of an interesting idea when you sat with a different team during lunch. Perhaps you attended a presentation by the business analysis group after the cancellation of an audit meeting. In either case, a synergy occured between new and acquired knowledge &n...

Comments  (0)

72cc4c5e6cbde70aa374bf94076ad722

How Enterprise Rights Management could have prevented the 'Serious' data breach at Gwent Police

April 26, 2010 Added by:Peter Abatan

Last week we read about the case of a serious data breach at Gwent Police in the UK where a spreadsheet was mailed to a journalist by mistake. This has led to an investigation by the Independent Police Commission and a possible fine of up to £500,000 by the Information Commissioner's Office. The file sent contained records of thousands of individuals applying for sensitive jobs was mistakenl...

Comments  (0)

6f611188ad4a81ffc2edab83b0705d76

The Secret is Out

April 22, 2010 Added by:Sandra Avery

What's the value of a trade secret?  That super secret special formula, recipe, design, or device that gives companies an edge against copy cats and competitors would appear to be priceless in some cases and extremely well-guarded. 

Comments  (5)

2ca59fd9c3117f138e722e13597f2b0b

Is it really important to have a structured security budget? (part1)

April 22, 2010 Added by:Dario Forte

At the time this post is being written, the dynamics of management's understanding of security issues and the valorization of security investments remain somewhat nebulous. Until this concept is fully interpreted and explored, this valorization is assigned to those in the company who deal with information security. And if they are lucky, they are given a reasonable budget to administrate.

Comments  (2)

509ea0c1f4a210534eb004d35c10aa2d

ISAlliance on Defense Industrial Base Cybersecurity

April 21, 2010 Added by:Marjorie Morgan

More information on the ISA's analysis of the economic impact of cybersecurity issues can be found in a new publication from the ISA and the American National Standards Institute (ANSI), The Financial Management of Cyber Risk: An Implementation Framework for CFOs.

Comments  (1)

924ce315203c17e05d9e04b59648a942

Cold War Holds Lessons for Cyber Strategy

April 21, 2010 Added by:Richard Stiennon

Perhaps in response to rather vocal criticism of his frantic warnings about cyberwar, Mike McConnell, retired Navy Admiral and  one time Director of National Intelligence, published a position piece in The Washington Post. He draws on the Cold War to support his thesis that the US must do more to counter cyber threats.  Here is my take on his comments.

Comments  (0)

85ac6feb584b665e85664974c546cfec

5 Tips to Strengthen Network Security with Limited Budgets

April 16, 2010 Added by:Ray Tan

Nowadays, IT departments are trying to find out ways to strength their network security with limited budgets. Especially small companies, which have even less budget on network security. It is more important for them to know some tips on how to strength their network security with limited budgets. I would like to share you the top 5 tips offered by Jon-Louis Heimerl.

Comments  (4)

6d117b57d55f63febe392e40a478011f

An Interview with U.N. Cybersecurity Expert Raoul Chiesa

April 15, 2010 Added by:Anthony M. Freed

I recently had the pleasure of talking with Raoul Chiesa, OPST, OPSA, and ISECOM Trainer, about international perspectives on cybersecurity issues. Mr. Chiesa is a Senior Advisor on Strategic Alliances & Cybercrime Issues at the Global Crimes Unit for the United Nations Interregional Crime & Justice Research Institute, a Member of the Permanent Stakeholders Group at the European Network &a...

Comments  (0)

49afa3a1bba5280af6c4bf2fb5ea7669

FaaS: Fraud as a Service

April 14, 2010 Added by:Mike Meikle

In working with various clients on the topic of security, a common theme has emerged. Management and employees still labor under the perception that fraud is still the purview of unorganized individuals with an axe to grind against a specific company. 

Comments  (0)

509ea0c1f4a210534eb004d35c10aa2d

Internet Security Alliance Comments on IT Cybersecurity

April 13, 2010 Added by:Marjorie Morgan

We must mitigate the ever-increasing abilities of today's cyber criminals to penetrate the current information security barriers, fire walls, etc. of industry and government organizations in order to gain access to the most sensitive and confidential private information stored in its databases.

Comments  (0)

E376ca757c1ebdfbca96615bf71247bb

eBay: a hacker's source for acquiring remote monitoring medical devices for security testing?

April 13, 2010 Added by:shawn merdinger

I typically check eBay weekly for medical devices showing up, with an eye for anything with a network interface. Bluetooth-enabled devices abound, but the (mis-perception) that an attacker must be physically close decreases popular interest from a security testing perspective. In contrast, it's a box "on the wire" that enables an attacker in say, Palau, to to reach out and provide what I...

Comments  (1)

72cc4c5e6cbde70aa374bf94076ad722

The Delivery of Customer’s Electronic Financial Statements using Enterprise Rights Management.

April 13, 2010 Added by:Peter Abatan

Post has been and is quickly becoming an increasing challenge for many organisations of all sizes. Apart from the security issues of financial data getting lost before delivery, spiralling costs of running mailing centres, postal strikes and the increasing cost of postage, businesses and organisations want to embrace technology as an alternative to using post

Comments  (1)

B09c361cbdc6cf629affdc7db30a186d

I'm not OK - And Why You Should Care

April 10, 2010 Added by:Steven Fox, CISSP, QSA

The SOW just came through on a new client.  You do some research and find that they just cut their staff by 20% – and you are the lucky security professional that gets to do their PCI compliance review!  You file this in the back of your mind as an environmental factor and proceed to prepare for the engagement.  After all, what matters here is the review, right?

Comments  (0)

Page « < 73 - 74 - 75 - 76 - 77 > »