Enterprise Security

99edc1997453f90eb5ac1430fd9a7c61

A history of bot fraud

May 16, 2010 Added by:Javvad Malik

Back in the old days before computers were invented or the Internet was discovered, everything was black and white and there were good guys and bad guys. The bad guys back in the day weren’t too different from those of today. Yeah sure they chewed tobacco, but their motives were the same, they wanted power and money.

Comments  (0)

924ce315203c17e05d9e04b59648a942

Cybersecurity Act of 2010 is Bad Medicine

May 15, 2010 Added by:Richard Stiennon

There are a bunch of cybersecurity bills trickling through Congress right now; some of them several years in the making. Senator Rockefeller’s Cybersecurity Act of 2010(S.773) is deemed the most likely to get voted on by the Senate as it was just unanimously passed through the Senate Committee that he chairs, Commerce Science and Transportation.  

Comments  (2)

1f2f664e68a603b3c54890fbbcd37857

Internet Legislation and Piracy

May 14, 2010 Added by:Mark Gardner

Net Neutrality in the US and the Digital Economy Act in the UK are attempts by Governments to start to legislate the Internet.Certainly the Digital Economy Act in the UK was written to prevent the piracy of film, music, photography etc. For what it's worth I don't agree with the measures in the Act, which gives the Government power to checktraffic and potentially block sites&nb...

Comments  (0)

72cc4c5e6cbde70aa374bf94076ad722

Why Corporate Secrets Must be Protected.

May 14, 2010 Added by:Peter Abatan

I recently read the Forrester Thought Leadership paper called “The Value of Corporate Secrets – How Compliance and Collaboration Affect Enterprise Perceptions of Risk”. I found the content very interesting as it gave me a further insight into how organisations think. So here is what I learnt from this paper. The bulk stops with the CISO when it comes to information security

Comments  (0)

6d117b57d55f63febe392e40a478011f

Education Sector is Failing Security

May 13, 2010 Added by:Anthony M. Freed

“The Social Security numbers of about 30,000 people became vulnerable after malicious software attacked Penn State University computers,” announced the headlines in December 2009. “Other data breaches occurred in January and February and in December 2008. One targeted a single computer; the two others affected hundreds of individuals.”

Comments  (21)

6d117b57d55f63febe392e40a478011f

Interview with Tony Agresta, VP of Marketing for Centrifuge

May 12, 2010 Added by:Anthony M. Freed

With data sources growing exponentially and competitive pressures at an all time high, the need to synthesize and extract meaning is critical to success. Centrifuge provides businesses with the freedom to explore data, uncover new insight and improve decision-making.

Comments  (0)

E973b16363b3de77b360563237df7e32

Open Source Intelligence Operations Part One

May 10, 2010 Added by:Bozidar Spirovski

Wikipedia defines Open source intelligence (OSINT) is a form of intelligence collection management that involves finding, selecting, and acquiring information from publicly available sources and analyzing it to produce actionable intelligence. In reality, the methodology used in OSINT is the information gathering phase of every penetration phase. They only stuck a fancy name to the process.

Comments  (0)

959779642e6e758563e80b5d83150a9f

Top Two Responses to a Security Threat

May 10, 2010 Added by:Danny Lieberman

How does your company mitigate the risk of data security threats? Is your company management adopting a policy of “It’s other peoples money”? In a recent thread on LinkedIn - Jody Keyser shared some quotes from David Vose’s book on risk, reliability and computerized risk modeling:  Risk Analysis a quantitative guide.

Comments  (0)

E66d48d7b227e7845b73d43eb1a06fcb

The cyber-gangsters' "weapons" and the state of Internet security

May 10, 2010 Added by:Roman Zeltser

Writing an article about Chinese hackers (all 3 parts were published here - please use the search to find them) I had to explain why it's difficult to fight against them due to a wide range of tools, methods and existing vulnerability of operating systems and applications in addition to the specific political conditions in China. Since this material turned to more than 15-page informati...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Seven Scary Cyber Scenarios

May 09, 2010 Added by:Richard Stiennon

Scenario planning is an important tool in the realm of cyber security.  Stakeholder teams are assembled to create plausible scenarios of possible future threats. Repercussions are predicted to help quantify risk and justify mitigating investments in technology and changes to policy and operations.

Comments  (1)

0a809ca78b9aa5393c0cb7dad7eb6a3a

DATA LEAKAGE a la Digital Copy Machine

May 06, 2010 Added by:David Jordan

Why spend time attempting to HACK an enterprise network when the wanted data is rolling out the door of the target facility each time a copier is replaced!

Comments  (6)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

Three Steps To Securing Your Network

May 06, 2010 Added by:Global Knowledge

Securing an organization's assets requires work, and there are many different ways to classify controls. This white paper examines three common types of controls are administrative, technical, and physical.

Comments  (2)

E66d48d7b227e7845b73d43eb1a06fcb

Should we be afraid of Chinese hackers? ...Or lost cyber war. (Part II)

May 03, 2010 Added by:Roman Zeltser

Internet users in China aged below 25 spend on average 50 percent of their leisure time online, according to this survey. Those surveyed in China demonstrated high levels of social media activity. Nearly 9 out of 10 Chinese respondents indicated that they actively read or contribute to blogs and 85 percent said they participate in chat rooms.

Comments  (2)

634ff692af43fd4dc5dab3b8590c77d6

Under illumination variations, exploiting 3D image for ‘Face Authentication’ in Biometrics…

May 02, 2010 Added by:K S Abhiraj

This article shows some of the basic techniques through which, Biometic authentication worked before.. and a basic mean how it could be crooked up, for gaining authentication. Automatic recognition of human faces is extremely useful in a wide area of applications, such as face identification for security and access control, surveillance of public places, mug shot matching and other commerc...

Comments  (0)

2ca59fd9c3117f138e722e13597f2b0b

Is it really important to have a structured security budget? (part3)

May 01, 2010 Added by:Dario Forte

One management practice that is often applied in structured organizations involves reporting the entire set of IT budget portfolio projects according to a view that links risk with value, as agreed between business functions and the IT department on the basis of predetermined yardsticks. 

Comments  (0)

Dd9902bc56a9d85cdc62c00083ea4871

What is a "Failure to Implement"?

April 30, 2010 Added by:Katie Weaver-Johnson

Recently, Awareity’s CEO, Rick Shaw, was asked to present at the Infotec conference in Omaha.   During his presentation, “The Truths (and Myths) About Assessments, Planning and Implementing”, Rick discussed the three-legged stool each organization is sitting on, and the importance of all three legs (Assessments, Planning/Developing and Implementing).

Comments  (3)

Page « < 74 - 75 - 76 - 77 - 78 > »