Enterprise Security


What is a "Failure to Implement"?

April 30, 2010 Added by:Katie Weaver-Johnson

Recently, Awareity’s CEO, Rick Shaw, was asked to present at the Infotec conference in Omaha.   During his presentation, “The Truths (and Myths) About Assessments, Planning and Implementing”, Rick discussed the three-legged stool each organization is sitting on, and the importance of all three legs (Assessments, Planning/Developing and Implementing).

Comments  (3)


Is it really important to have a structured security budget? (part2)

April 30, 2010 Added by:Dario Forte

Company problems cannot be resolved with software. Another factor that I have noticed in my recent work as security advisor is the divergence between the enthusiasm of providers for the growth in security budgets, as reported in the surveys of recent years, and reality. It is probable that more is invested in security hardware and software, but this does not necessarily mean increasing security...

Comments  (0)


Google Hack Whacks Passwords

April 30, 2010 Added by:Robert Siciliano

Code named Gaia after “Greek Goddess of Earth” a Google single sign on password system was hacked in December. Google is a significant part of many individuals and businesses online activities. Millions rely on Google every day to be fast, functional and most important, secure. A breach such as this may erode the confidence of Google users, but for many, they have all their egg...

Comments  (2)


Carl Levin Poses Several Cyber Scenarios

April 29, 2010 Added by:Richard Stiennon

Today’s hearing on the nominations of Keith Alexander to head CYBERCOM (and Admiral Winnfield to head NORAD and NORTHCOM) were the first time that  operational responsibilities of CYBERCOM have been discussed in a public forum.

Comments  (0)


On Secure and Agile Collaboration

April 29, 2010 Added by:Danny Lieberman

One of the biggest challenges in global multi-center clinical trials (after enrollment of patients) is collaboration between multi-center clinical trial teams: CRAs, investigators, regulatory, marketing, manufacturing, market research, data managers, statisticians and site administrators.

Comments  (1)


Congressional Briefing: The Economics of Cybersecurity

April 26, 2010 Added by:Marjorie Morgan

On May 7, 2010, the Internet Security Alliance (ISA) and the American National Standards Institute (ANSI) will brief members of Congress and their staff on their new publication, The FinancialManagement of Cyber Risk: An Implementation Framework for CFOs.

Comments  (0)


Risk Mitigation through Collaborative Innovation

April 26, 2010 Added by:Steven Fox, CISSP, QSA

Did you innovate today? Let’s say that you did! Good job! Did you get the idea from a podcast or webinar? Maybe. Odds are that you got wind of an interesting idea when you sat with a different team during lunch. Perhaps you attended a presentation by the business analysis group after the cancellation of an audit meeting. In either case, a synergy occured between new and acquired knowledge &n...

Comments  (0)


How Enterprise Rights Management could have prevented the 'Serious' data breach at Gwent Police

April 26, 2010 Added by:Peter Abatan

Last week we read about the case of a serious data breach at Gwent Police in the UK where a spreadsheet was mailed to a journalist by mistake. This has led to an investigation by the Independent Police Commission and a possible fine of up to £500,000 by the Information Commissioner's Office. The file sent contained records of thousands of individuals applying for sensitive jobs was mistakenl...

Comments  (0)


The Secret is Out

April 22, 2010 Added by:Sandra Avery

What's the value of a trade secret?  That super secret special formula, recipe, design, or device that gives companies an edge against copy cats and competitors would appear to be priceless in some cases and extremely well-guarded. 

Comments  (5)


Is it really important to have a structured security budget? (part1)

April 22, 2010 Added by:Dario Forte

At the time this post is being written, the dynamics of management's understanding of security issues and the valorization of security investments remain somewhat nebulous. Until this concept is fully interpreted and explored, this valorization is assigned to those in the company who deal with information security. And if they are lucky, they are given a reasonable budget to administrate.

Comments  (2)


ISAlliance on Defense Industrial Base Cybersecurity

April 21, 2010 Added by:Marjorie Morgan

More information on the ISA's analysis of the economic impact of cybersecurity issues can be found in a new publication from the ISA and the American National Standards Institute (ANSI), The Financial Management of Cyber Risk: An Implementation Framework for CFOs.

Comments  (1)


Cold War Holds Lessons for Cyber Strategy

April 21, 2010 Added by:Richard Stiennon

Perhaps in response to rather vocal criticism of his frantic warnings about cyberwar, Mike McConnell, retired Navy Admiral and  one time Director of National Intelligence, published a position piece in The Washington Post. He draws on the Cold War to support his thesis that the US must do more to counter cyber threats.  Here is my take on his comments.

Comments  (0)


5 Tips to Strengthen Network Security with Limited Budgets

April 16, 2010 Added by:Ray Tan

Nowadays, IT departments are trying to find out ways to strength their network security with limited budgets. Especially small companies, which have even less budget on network security. It is more important for them to know some tips on how to strength their network security with limited budgets. I would like to share you the top 5 tips offered by Jon-Louis Heimerl.

Comments  (4)


An Interview with U.N. Cybersecurity Expert Raoul Chiesa

April 15, 2010 Added by:Anthony M. Freed

I recently had the pleasure of talking with Raoul Chiesa, OPST, OPSA, and ISECOM Trainer, about international perspectives on cybersecurity issues. Mr. Chiesa is a Senior Advisor on Strategic Alliances & Cybercrime Issues at the Global Crimes Unit for the United Nations Interregional Crime & Justice Research Institute, a Member of the Permanent Stakeholders Group at the European Network &a...

Comments  (0)


FaaS: Fraud as a Service

April 14, 2010 Added by:Mike Meikle

In working with various clients on the topic of security, a common theme has emerged. Management and employees still labor under the perception that fraud is still the purview of unorganized individuals with an axe to grind against a specific company. 

Comments  (0)


Internet Security Alliance Comments on IT Cybersecurity

April 13, 2010 Added by:Marjorie Morgan

We must mitigate the ever-increasing abilities of today's cyber criminals to penetrate the current information security barriers, fire walls, etc. of industry and government organizations in order to gain access to the most sensitive and confidential private information stored in its databases.

Comments  (0)

Page « < 76 - 77 - 78 - 79 - 80 > »