Security Awareness

7af56c65866a442699d6dd1dfb02b528

Invitation to Webinar on Data-Centric Security

June 18, 2010 Added by:Eli Talmor

This presentation will discuss data-centric security solutions for online transaction using browser channel, such as banking transfers, ecommerce purchases, insurance claims filings, healthcare drug prescriptions and Internet voting.

Comments  (0)

5a432ca05467666d90425b7b869c5003

Is the U.S. prepared for cyber war or are we sitting ducks?

June 17, 2010 Added by:Ron Lepofsky

Last night Pres Obama made a  speech  to the nation about the BP oil spill.  One of his three central points dealt with preventing a future oil spill disaster.  Today the President  told BP to allocate billions of dollars to reimburse those who suffered as the result of BP’s oil spill. Perhaps now is the time to take similar action and allocate funds and sticks to pr...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Most overhyped security

June 16, 2010 Added by:Javvad Malik

Whether you call it security theatre or just a sales pitch that sets expectations too high. We've had lots of products and processes that have claimed to increase security only to contain enough hot air to propel one of Richard Bransons baloons across the world.

Comments  (0)

924ce315203c17e05d9e04b59648a942

Surviving Cyberwar Published

June 15, 2010 Added by:Richard Stiennon

After a five month period of editing, indexing, and finally printing, Surviving Cyberwar has been published by Government Institutes, an imprint of Scarecrow Press, a division of the Rowman and Littlefield company.

Comments  (0)

49afa3a1bba5280af6c4bf2fb5ea7669

IT Marketing: There is No App for That

June 14, 2010 Added by:Mike Meikle

For the average information technology professional, the concept of marketing & selling is an alien skill set; like under-water bagpipe playing.  In the eye of the IT pro, this skill is composed mostly of excessive hair-gel, pointless presentations and flim-flam.

Comments  (0)

6d117b57d55f63febe392e40a478011f

No Internet Kill Switch is No Guarantee

June 13, 2010 Added by:Anthony M. Freed

In continued efforts to centralize the cybersecurity authority within the White House, more than 40 bills have been introduced that will dramatically alter the balance of power between the government and the private sector. Protecting Cyberspace as a National Asset Act of 2010 will shift the responsibility of federal agency cybersecurity from the Office of Management and Budget (OMB) to DHS by cre...

Comments  (3)

509ea0c1f4a210534eb004d35c10aa2d

DHS Cyber Security Resources Catalog

June 12, 2010 Added by:Marjorie Morgan

The Department of Homeland Security (DHS) has released a "Private Sector Resources Catalog" collecting training, publications, guidance, alerts, newsletters, programs, and services available to the private sector. This is the first such effort to encompass all of DHS and represents a commitment to facilitate public access and increase transparency.

Comments  (0)

192a6e6df92a5ebd88de9b476fdd350d

Computer Security or Information Security? What are we talking about?

June 10, 2010 Added by:Jorge Mieres

I usually receive consultations in which, conceptually speaking, there is a notable confusion about the difference between computer security and information security. Therefore, we will try to clarify the issue in question.

Comments  (1)

B09c361cbdc6cf629affdc7db30a186d

Compliance Management Challenges - Incomplete Coverage

June 06, 2010 Added by:Steven Fox, CISSP, QSA

Regulatory requirements are part of the business landscape for most businesses.  Regulatory compliance was cited as a driver for security investments by 40% of the respondents summarized in the March 2009 OWASP Security Spending Benchmarks Project Report.  This reflects one of the drivers for the development of industry, state, and federal regulations – the confidentiality and inte...

Comments  (0)

7af56c65866a442699d6dd1dfb02b528

Data-centric security

June 06, 2010 Added by:Eli Talmor

IT security professionals engaged in a game of cat and mouse with hackers as fast as they deploy security countermeasures, these rogue elements discover loopholes or entirely new avenues of attack. Traditional security methods have relied upon closely guarding the perimeter of a company's network.

Comments  (0)

F520f65cba281c31e29c857faa651872

The Social Networking Suicide Machine

June 01, 2010 Added by:Rahul Neel Mani

The creator of the 'Suicide Machine', Gordan Savicic, believes that connectivity and the social experience offered by web2.0 companies goes against the grain of human freedom. In an interaction with Rahul Neel Mani, Savicic talks about what motivated his team to design the noose that would allow users to strangle their virtual identities.

Comments  (0)

7af56c65866a442699d6dd1dfb02b528

How to deal with failure to keep the bad guys out.

May 26, 2010 Added by:Eli Talmor

More money is now being made from cybercrime than the billions that come from drug trafficking, AT&T's Chief Security Officer Edward Amoroso has told a US Senate Commerce Committee. Some $1 trillion annually is being siphoned off by cyber criminals according to the security chief.

Comments  (0)

Dba00ace283759a06b07f9ae2f6b0751

The Scary Truth about Copiers

May 25, 2010 Added by:dgonzalez

IT professional or not, surely you have come across copiers. You know the ones most organizations have now a days. Those multi-function devices that print, scan, copy, fax, email, staple, punch holes and make egg omelets…ok maybe no omelets, but you get the point. They are feature rich and each one of those features come with a price. While you don’t necessari...

Comments  (15)

4e21f96122846f32545687ad42b271e2

Giving information security a KISS!

May 25, 2010 Added by:Security Ninja

The KISS I’m talking about giving to information security is the KISS principle: Keep It Short and Simple (or Keep It Simple Stupid)

Comments  (6)

6d117b57d55f63febe392e40a478011f

DOW Plunge Highlights Trillion Dollar Hacker Threat

May 24, 2010 Added by:Anthony M. Freed

Investigations continue into the root cause of the anomalous stock market volatility that recently saw nearly one trillion dollars in market value evaporate in matter of minutes. Three very possible scenarios where postulated immediately in the news, one being a "hacker" attempt.

Comments  (19)

91648658a3e987ddb81913b06dbdc57a

ALL Security is Local

May 22, 2010 Added by:Ron Baklarz

Thomas P. O’Neill, former speaker of the US House of Representatives Tip O’Neill’s father, once said that “all politics is local.”  He postulated this axiom upon his son’s experiencing his first, and last, political loss.  What the wise father was advising his son was that he needed to be aware of and work harder on the political issues in his ow...

Comments  (0)

Page « < 51 - 52 - 53 - 54 - 55 > »
Most Liked