Security Awareness

F520f65cba281c31e29c857faa651872

Interview with Symantec CTO Mark Bregman

May 10, 2010 Added by:Rahul Neel Mani

Mark Bregman, Executive Vice President and Chief Technology Offcer, Symantec Corporation says that SaaS has the potential to be a game changer. In a conversation with Ashwani Mishra, Bregman talks about the company’s strategy in the security and storage areas and how it plans to deliver best solutions to its customers.

Comments  (0)

E66d48d7b227e7845b73d43eb1a06fcb

The cyber-gangsters' "weapons" and the state of Internet security

May 10, 2010 Added by:Roman Zeltser

Writing an article about Chinese hackers (all 3 parts were published here - please use the search to find them) I had to explain why it's difficult to fight against them due to a wide range of tools, methods and existing vulnerability of operating systems and applications in addition to the specific political conditions in China. Since this material turned to more than 15-page informati...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Seven Scary Cyber Scenarios

May 09, 2010 Added by:Richard Stiennon

Scenario planning is an important tool in the realm of cyber security.  Stakeholder teams are assembled to create plausible scenarios of possible future threats. Repercussions are predicted to help quantify risk and justify mitigating investments in technology and changes to policy and operations.

Comments  (1)

59d9b46aa00c70238bb89056cfeb96c0

FCPA Compliance and Continuous Controls Monitoring

May 09, 2010 Added by:Thomas Fox

In a 2008 speech to the Texas General Counsel Forum, former United States Deputy Attorney General Paul McNulty provided his perspective on Foreign Corrupt Practices Act (FCPA) compliance investigations and the Department of Justice (DOJ) enforcement actions. From his experience as the former second highest-ranking official in the DOJ and the chairman of the President’s Corporate Fraud Task Fo...

Comments  (0)

1f2f664e68a603b3c54890fbbcd37857

Death by Powerpoint

May 06, 2010 Added by:Mark Gardner

So we've all sat through endless presentations with the presenter reciting the bullets on the screen that you've read in 30 seconds flat when the screen popped up.August designers such as Garr Reynolds (Presentation Zen)  and Nancy Duarte (Slide:ology) have written tremendous books and have wonderful blogs, (which you can find through links on my blog - http://markg1975.wordpress.com) co...

Comments  (3)

37d5f81e2277051bc17116221040d51c

Personal Knowledge or “Qualifying Questions” as Authenticators

May 03, 2010 Added by:Robert Siciliano

How many times have you forgotten a password? Fortunately the website you were on only needed your username or an email address and they would respond with a few questions for you to answer. Once you responded with what was in the system you then re-set your password and you’re in.  Easy peazy.

Comments  (2)

694eabca410cc15c81fab9dc514a629e

Would you like to meet an Identity Thief?

May 03, 2010 Added by:Bruno Pavlicek

Much has been written on the topic of Identity Theft. But what do we really know about the identity thieves themselves. Who are they? How do they operate? What motivates them? To begin with, one needs to appreciate that America is plagued with an endless epidemic of identity theft.

Comments  (3)

509ea0c1f4a210534eb004d35c10aa2d

ISAlliance Takes Lead at Worldwide Cybersecurity Summit

May 03, 2010 Added by:Marjorie Morgan

Internet Security Alliance President Larry Clinton has been asked to chair the National Security sector of the First Worldwide Cybersecurity Summit scheduled to take place in Dallas from May 3-5.

Comments  (0)

F72838a46139d9e8c1d71c9204376a88

Hacking Forensic Security channel update

May 02, 2010 Added by:Christiaan Colen

About a year ago I started the youtube channel Hacking Forensic Security (HFS). The channel contains more then 2600 videos about hacking, forensics and security. For example videos from the Hack In The Box, HAR 2009 or Shmoocon conferences. You can also find awareness videos and videos about digital forensics.

Comments  (0)

Dd9902bc56a9d85cdc62c00083ea4871

What is a "Failure to Implement"?

April 30, 2010 Added by:Katie Weaver-Johnson

Recently, Awareity’s CEO, Rick Shaw, was asked to present at the Infotec conference in Omaha.   During his presentation, “The Truths (and Myths) About Assessments, Planning and Implementing”, Rick discussed the three-legged stool each organization is sitting on, and the importance of all three legs (Assessments, Planning/Developing and Implementing).

Comments  (3)

2ca59fd9c3117f138e722e13597f2b0b

Is it really important to have a structured security budget? (part2)

April 30, 2010 Added by:Dario Forte

Company problems cannot be resolved with software. Another factor that I have noticed in my recent work as security advisor is the divergence between the enthusiasm of providers for the growth in security budgets, as reported in the surveys of recent years, and reality. It is probable that more is invested in security hardware and software, but this does not necessarily mean increasing security...

Comments  (0)

E66d48d7b227e7845b73d43eb1a06fcb

Should we be afraid of Chinese hackers? ...Or lost cyber war

April 27, 2010 Added by:Roman Zeltser

The terms "cyber terrorism" or "information warfare" are derived from political agendas of those who rule the countries or from global conglomerates and large corporations that don't hesitate to use any possible measures to achieve their goal. The information age gave us not only sophisticated computer equipment, software, and gadgets but also something that many of u...

Comments  (4)

509ea0c1f4a210534eb004d35c10aa2d

Congressional Briefing: The Economics of Cybersecurity

April 26, 2010 Added by:Marjorie Morgan

On May 7, 2010, the Internet Security Alliance (ISA) and the American National Standards Institute (ANSI) will brief members of Congress and their staff on their new publication, The FinancialManagement of Cyber Risk: An Implementation Framework for CFOs.

Comments  (0)

E376ca757c1ebdfbca96615bf71247bb

Chisco: Welcome To The Hunan Network?

April 23, 2010 Added by:shawn merdinger

On NPR's 'Fresh Air' this week, Richard Clarke made some great points, in particular with the logic bomb scenarios of sneaking in code and untrustworthy hardware. While this is old news, it's still a very real threat -- recall that Chisco devices were discovered on US government networks and disclosed back in 2008.

Comments  (0)

509ea0c1f4a210534eb004d35c10aa2d

ISAlliance on Defense Industrial Base Cybersecurity

April 21, 2010 Added by:Marjorie Morgan

More information on the ISA's analysis of the economic impact of cybersecurity issues can be found in a new publication from the ISA and the American National Standards Institute (ANSI), The Financial Management of Cyber Risk: An Implementation Framework for CFOs.

Comments  (1)

924ce315203c17e05d9e04b59648a942

Cold War Holds Lessons for Cyber Strategy

April 21, 2010 Added by:Richard Stiennon

Perhaps in response to rather vocal criticism of his frantic warnings about cyberwar, Mike McConnell, retired Navy Admiral and  one time Director of National Intelligence, published a position piece in The Washington Post. He draws on the Cold War to support his thesis that the US must do more to counter cyber threats.  Here is my take on his comments.

Comments  (0)

Page « < 54 - 55 - 56 - 57 - 58 > »