Security Awareness

B09c361cbdc6cf629affdc7db30a186d

Compliance Management Challenges - Incomplete Coverage

June 06, 2010 Added by:Steven Fox, CISSP, QSA

Regulatory requirements are part of the business landscape for most businesses.  Regulatory compliance was cited as a driver for security investments by 40% of the respondents summarized in the March 2009 OWASP Security Spending Benchmarks Project Report.  This reflects one of the drivers for the development of industry, state, and federal regulations – the confidentiality and inte...

Comments  (0)

7af56c65866a442699d6dd1dfb02b528

Data-centric security

June 06, 2010 Added by:Eli Talmor

IT security professionals engaged in a game of cat and mouse with hackers as fast as they deploy security countermeasures, these rogue elements discover loopholes or entirely new avenues of attack. Traditional security methods have relied upon closely guarding the perimeter of a company's network.

Comments  (0)

F520f65cba281c31e29c857faa651872

The Social Networking Suicide Machine

June 01, 2010 Added by:Rahul Neel Mani

The creator of the 'Suicide Machine', Gordan Savicic, believes that connectivity and the social experience offered by web2.0 companies goes against the grain of human freedom. In an interaction with Rahul Neel Mani, Savicic talks about what motivated his team to design the noose that would allow users to strangle their virtual identities.

Comments  (0)

7af56c65866a442699d6dd1dfb02b528

How to deal with failure to keep the bad guys out.

May 26, 2010 Added by:Eli Talmor

More money is now being made from cybercrime than the billions that come from drug trafficking, AT&T's Chief Security Officer Edward Amoroso has told a US Senate Commerce Committee. Some $1 trillion annually is being siphoned off by cyber criminals according to the security chief.

Comments  (0)

Dba00ace283759a06b07f9ae2f6b0751

The Scary Truth about Copiers

May 25, 2010 Added by:dgonzalez

IT professional or not, surely you have come across copiers. You know the ones most organizations have now a days. Those multi-function devices that print, scan, copy, fax, email, staple, punch holes and make egg omelets…ok maybe no omelets, but you get the point. They are feature rich and each one of those features come with a price. While you don’t necessari...

Comments  (15)

4e21f96122846f32545687ad42b271e2

Giving information security a KISS!

May 25, 2010 Added by:Security Ninja

The KISS I’m talking about giving to information security is the KISS principle: Keep It Short and Simple (or Keep It Simple Stupid)

Comments  (6)

6d117b57d55f63febe392e40a478011f

DOW Plunge Highlights Trillion Dollar Hacker Threat

May 24, 2010 Added by:Anthony M. Freed

Investigations continue into the root cause of the anomalous stock market volatility that recently saw nearly one trillion dollars in market value evaporate in matter of minutes. Three very possible scenarios where postulated immediately in the news, one being a "hacker" attempt.

Comments  (19)

91648658a3e987ddb81913b06dbdc57a

ALL Security is Local

May 22, 2010 Added by:Ron Baklarz

Thomas P. O’Neill, former speaker of the US House of Representatives Tip O’Neill’s father, once said that “all politics is local.”  He postulated this axiom upon his son’s experiencing his first, and last, political loss.  What the wise father was advising his son was that he needed to be aware of and work harder on the political issues in his ow...

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Open Source: Free or Commercial? You Decide...

May 20, 2010 Added by:Anton Chuvakin

Open source software that is freely available for download and use is one of the greatest things about our technical community. The fact that at any given time I have a massive library of software available at my fingertips to accomplish any number of software tasks is nothing short of amazing! Then you tell me that if there is something I want to add to the software, I just jump in a...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Top 10 Jobs For Criminal Hackers

May 12, 2010 Added by:Robert Siciliano

So you wanna go to the dark side? You’ve been hearing all about this hacking thing and you’d like to impress your girlfriend and show her how you can hack into corporate databases eh? Well, first if you are nodding your head, you’re an idiot. Second, chances are better than ever that you’ll get caught.

Comments  (2)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

Top 10 Skills in Demand in 2010

May 11, 2010 Added by:Global Knowledge

In the Global Knowledge/TechRepublic 2010 Salary Survey, conducted at the end of last year, one of the questions put to respondents was "What skill set will your company be looking to add in 2010?" The skills listed by respondents include the perennial favorites, such as security, network administration, and Windows administration.

Comments  (0)

37d5f81e2277051bc17116221040d51c

Why Everyone Should Learn to Be A Hacker

May 11, 2010 Added by:Robert Siciliano

I know enough about hacking to make all of my software un-usable, mess up my operating system, and crash my PC. I also know enough about hacking to re-install my operating system, re-install all my software and get my PC running fresh and relatively secure. I’m no criminal hacker. And I am not suggesting that. Nor can I program; I don’t know code but I do know enough to hack in a ...

Comments  (9)

F520f65cba281c31e29c857faa651872

Interview with Symantec CTO Mark Bregman

May 10, 2010 Added by:Rahul Neel Mani

Mark Bregman, Executive Vice President and Chief Technology Offcer, Symantec Corporation says that SaaS has the potential to be a game changer. In a conversation with Ashwani Mishra, Bregman talks about the company’s strategy in the security and storage areas and how it plans to deliver best solutions to its customers.

Comments  (0)

E66d48d7b227e7845b73d43eb1a06fcb

The cyber-gangsters' "weapons" and the state of Internet security

May 10, 2010 Added by:Roman Zeltser

Writing an article about Chinese hackers (all 3 parts were published here - please use the search to find them) I had to explain why it's difficult to fight against them due to a wide range of tools, methods and existing vulnerability of operating systems and applications in addition to the specific political conditions in China. Since this material turned to more than 15-page informati...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Seven Scary Cyber Scenarios

May 09, 2010 Added by:Richard Stiennon

Scenario planning is an important tool in the realm of cyber security.  Stakeholder teams are assembled to create plausible scenarios of possible future threats. Repercussions are predicted to help quantify risk and justify mitigating investments in technology and changes to policy and operations.

Comments  (1)

59d9b46aa00c70238bb89056cfeb96c0

FCPA Compliance and Continuous Controls Monitoring

May 09, 2010 Added by:Thomas Fox

In a 2008 speech to the Texas General Counsel Forum, former United States Deputy Attorney General Paul McNulty provided his perspective on Foreign Corrupt Practices Act (FCPA) compliance investigations and the Department of Justice (DOJ) enforcement actions. From his experience as the former second highest-ranking official in the DOJ and the chairman of the President’s Corporate Fraud Task Fo...

Comments  (0)

Page « < 53 - 54 - 55 - 56 - 57 > »