Security Awareness

509ea0c1f4a210534eb004d35c10aa2d

ISAlliance Takes Lead at Worldwide Cybersecurity Summit

May 03, 2010 Added by:Marjorie Morgan

Internet Security Alliance President Larry Clinton has been asked to chair the National Security sector of the First Worldwide Cybersecurity Summit scheduled to take place in Dallas from May 3-5.

Comments  (0)

F72838a46139d9e8c1d71c9204376a88

Hacking Forensic Security channel update

May 02, 2010 Added by:Christiaan Colen

About a year ago I started the youtube channel Hacking Forensic Security (HFS). The channel contains more then 2600 videos about hacking, forensics and security. For example videos from the Hack In The Box, HAR 2009 or Shmoocon conferences. You can also find awareness videos and videos about digital forensics.

Comments  (0)

Dd9902bc56a9d85cdc62c00083ea4871

What is a "Failure to Implement"?

April 30, 2010 Added by:Katie Weaver-Johnson

Recently, Awareity’s CEO, Rick Shaw, was asked to present at the Infotec conference in Omaha.   During his presentation, “The Truths (and Myths) About Assessments, Planning and Implementing”, Rick discussed the three-legged stool each organization is sitting on, and the importance of all three legs (Assessments, Planning/Developing and Implementing).

Comments  (3)

2ca59fd9c3117f138e722e13597f2b0b

Is it really important to have a structured security budget? (part2)

April 30, 2010 Added by:Dario Forte

Company problems cannot be resolved with software. Another factor that I have noticed in my recent work as security advisor is the divergence between the enthusiasm of providers for the growth in security budgets, as reported in the surveys of recent years, and reality. It is probable that more is invested in security hardware and software, but this does not necessarily mean increasing security...

Comments  (0)

E66d48d7b227e7845b73d43eb1a06fcb

Should we be afraid of Chinese hackers? ...Or lost cyber war

April 27, 2010 Added by:Roman Zeltser

The terms "cyber terrorism" or "information warfare" are derived from political agendas of those who rule the countries or from global conglomerates and large corporations that don't hesitate to use any possible measures to achieve their goal. The information age gave us not only sophisticated computer equipment, software, and gadgets but also something that many of u...

Comments  (4)

509ea0c1f4a210534eb004d35c10aa2d

Congressional Briefing: The Economics of Cybersecurity

April 26, 2010 Added by:Marjorie Morgan

On May 7, 2010, the Internet Security Alliance (ISA) and the American National Standards Institute (ANSI) will brief members of Congress and their staff on their new publication, The FinancialManagement of Cyber Risk: An Implementation Framework for CFOs.

Comments  (0)

E376ca757c1ebdfbca96615bf71247bb

Chisco: Welcome To The Hunan Network?

April 23, 2010 Added by:shawn merdinger

On NPR's 'Fresh Air' this week, Richard Clarke made some great points, in particular with the logic bomb scenarios of sneaking in code and untrustworthy hardware. While this is old news, it's still a very real threat -- recall that Chisco devices were discovered on US government networks and disclosed back in 2008.

Comments  (0)

509ea0c1f4a210534eb004d35c10aa2d

ISAlliance on Defense Industrial Base Cybersecurity

April 21, 2010 Added by:Marjorie Morgan

More information on the ISA's analysis of the economic impact of cybersecurity issues can be found in a new publication from the ISA and the American National Standards Institute (ANSI), The Financial Management of Cyber Risk: An Implementation Framework for CFOs.

Comments  (1)

924ce315203c17e05d9e04b59648a942

Cold War Holds Lessons for Cyber Strategy

April 21, 2010 Added by:Richard Stiennon

Perhaps in response to rather vocal criticism of his frantic warnings about cyberwar, Mike McConnell, retired Navy Admiral and  one time Director of National Intelligence, published a position piece in The Washington Post. He draws on the Cold War to support his thesis that the US must do more to counter cyber threats.  Here is my take on his comments.

Comments  (0)

49afa3a1bba5280af6c4bf2fb5ea7669

FaaS: Fraud as a Service

April 14, 2010 Added by:Mike Meikle

In working with various clients on the topic of security, a common theme has emerged. Management and employees still labor under the perception that fraud is still the purview of unorganized individuals with an axe to grind against a specific company. 

Comments  (0)

37d5f81e2277051bc17116221040d51c

10 Personal Safety and Security Tips

April 10, 2010 Added by:Robert Siciliano

Fundamentals: Body language is 55% of communications. That’s your walk, posture, facial expressions and eye contact. Awareness is being alert to your surroundings at all times. Intuition is when the hair on the back of your neck stands on end. Voice tone and pitch equal 35% of communications. The way a person communicates physically and verbally can determine whether or not a predator deems ...

Comments  (6)

509ea0c1f4a210534eb004d35c10aa2d

ISAlliance Expresses Tentative Support for Cyber Legislation

April 08, 2010 Added by:Marjorie Morgan

On Wednesday, March 24, the Senate Commerce Committee became the first Congressional Committee to approve a comprehensive cybersecurity bill. The "kill-switch" provision (turning off the Internet) and federally mandated technical standards on the private sector have been eliminated from earlier versions of the legislation and the bill now embraces private sector standards and market incentiv...

Comments  (0)

49afa3a1bba5280af6c4bf2fb5ea7669

Fed Guidelines for Social Media Review part II

April 07, 2010 Added by:Mike Meikle

I promised in my last post to walk you through the various supporting documents that are tied to the Feds’ Social Media Guidelines.  Also, I will act as translator for all the corporate/government  speak.   This way lies madness, abandon all hope ye who enter, etc.

Comments  (0)

Dd9902bc56a9d85cdc62c00083ea4871

AntiMistake Software – Preventing Human Error and Lack of Awareness

April 07, 2010 Added by:Katie Weaver-Johnson

Successful organizations realize antivirus software must be installed on all PCs.  Antivirus software works well if updates are automatic and ongoing (as new risks and threats are identified) to prevent expensive damages to PCs, information and reputations. 

Comments  (1)

7ac151cecb6d5053d7cf4c7fa1ac596e

Data Security - It's a responsibility, not an option...

April 07, 2010 Added by:Ian Barrs

"We need to talk about security, it's becoming an issue." This is a line that would draw a blank on many a CEOs face, even today. "We've got strong password policies, and no-one's allowed to use USBs", the CEO may burble. If that's your last line of defence, and you merely trust people to follow the rules, you're heading for trouble.

Comments  (0)

Dd9902bc56a9d85cdc62c00083ea4871

Passwords…Are they needed?

April 06, 2010 Added by:Katie Weaver-Johnson

This week I received an e-mail from a friend of mine saying he was in the UK to visit his ill sister and needed to borrow money…perhaps many of you have received an e-mail like this too?  In reality, my friend’s e-mail account had been hacked and the e-mail was a hoax.

Comments  (5)

Page « < 52 - 53 - 54 - 55 - 56 > »