Digital Forensics and E-Discovery on OpenVMS

February 21, 2011 Added by:Robert Gezelter

OpenVMS system managers need to develop the plans, processes, and procedures to respond to legal process requests. Correctly dealing with these requests minimizes the impact on production systems. Failure to address these situations can expose the organization to significant liability...

Comments  (0)


Shoring Up National Cyber Security Infrastructure

February 21, 2011 Added by:Robert Siciliano

Corporations and government agencies are legally required to secure their systems. But no such standards exist for the consumer. No laws require you to take a single step for the sake of your own security. Software vendors should certainly be held accountable if their products aren’t secure...

Comments  (0)


Managing the Infosec Investigative Function

February 13, 2011 Added by:Kurt Aubuchon

Conducting effective investigations requires specialized knowledge, skills, and abilities. It is not necessarily the case that the Infosec analyst who can manage a tight network perimeter can also conduct a good investigation. Investigations are risky and politically sensitive affairs...

Comments  (0)


Security Risks: Betting With Other People's Money

February 11, 2011 Added by:Rafal Los

The company made a conscious decision, at the board level to stick its head in the sand. After doing some complex mathematical calculations and figuring out what a full-scale Software Security Assurance program would cost versus what it costs to pay fines and lawyers, they've decided on the latter...

Comments  (2)


Policies: What I Learned From Being a “Dummy”

February 10, 2011 Added by:Brad Bemis

I wonder what the world would be like if we wrote our policies and supporting documentation in a for-dummies-like format. Why? Because right now the common security policy fits the same bill that all those stuffy, confusing, technical references once did – and they simply don’t work...

Comments  (5)


Colliding Worlds: Pervasive Connectivity and Social Media

February 10, 2011 Added by:Robert Gezelter

The societal landscape has been altered by pervasive connectivity and the availability of information. Our practices must be revised to reflect this new landscape. The pervasiveness of wireless communications has reached the threshold where the integrity of jury trials is at risk...

Comments  (0)


Senator Proposes New Cybersecurity Legislation

February 10, 2011 Added by:Headlines

"Cyber-threats are not on the horizon, they are upon us. Businesses and investors must trust that their investments are secure. We cannot allow security breaches to undermine our trust in the U.S. economy," said Senator Menendez...

Comments  (0)


Employee Privacy Enjoys Gains in the U.S.

January 22, 2011 Added by:David Navetta

2010 arguably was a breakout year for consumer privacy, but the year also brought about significant changes to employee privacy. Federal and state court decisions, state legislation and agency actions suggest that the U.S. may be moving towards a greater level of privacy protection for employees...

Comments  (0)


Tips for Taking Charge of a SysAdmin Team

January 16, 2011 Added by:Jamie Adams

When I enter the organization, I don't immediately request access to the systems but rather I begin going over architectural diagrams, operational procedures, and peering over the shoulders of the system administrators. If the aforementioned documents are not present, then we have a problem...

Comments  (1)


Congressman Wants WikiLeaks on Treasury Blacklist

January 14, 2011 Added by:Headlines

Blacklisting by the Treasury Department is equivalent to marking an individual or group on par with terrorist organizations, and would bar U.S. citizens and companies from doing business or providing any material support whatsoever for the rogue whistleblower organization...

Comments  (0)


When Computers Watch Us, Who Watches Them?

January 10, 2011 Added by:Theresa Payton

When security guards use surveillance TVs they apply acumen, logic, intuition and skill. Computers use face recognition software and behavior patterns. This has far reaching opportunities to improve lives but potentially at the cost of your privacy. That does not mean I am opposed to it...

Comments  (0)


Commerce Department to Reign Over Cyber Identities

January 08, 2011 Added by:Headlines

"We are not talking about a government-controlled system. What we are talking about is enhancing online security and privacy, and reducing and perhaps even eliminating the need to memorize a dozen passwords, through creation and use of more trusted digital identities..."

Comments  (0)


CIOs Must Keep the Focus on the Big Picture

January 07, 2011 Added by:Rahul Neel Mani

A smart CIO knows when to stay out of tactical initiatives within the company, let his team get on with it, and keeps the focus on the big picture, says Anjan Bose, CIO Haldia Petrochemicals Ltd. Bose equips himself to see IT as a component of business, and never business as means to deploy IT...

Comments  (0)


Do We Know the Impacts of Net Neutrality?

January 07, 2011 Added by:Theresa Payton

Internet Freedom Advocates do not think it goes far enough. Watchdogs at the Electronic Frontier Foundation are afraid the FCC Order will squash new innovation and new company launches due to legal and costly barriers to entry...

Comments  (0)


Why QA Doesn't Do Security Testing

January 06, 2011 Added by:Rafal Los

Just because you're checking for the existence of the password requirement, or making sure pages aren't accessible without authentication doesn't actually mean you're doing security testing. In reality, this is just a small part of the overall security testing that applications require...

Comments  (1)


False Positives: The Best Way to Kill a Good Initiative

January 05, 2011 Added by:Robb Reck

The more we raise alerts about issues that either don't exist, or aren't worth the attention we give them, the less interested people are in hearing what we have to say. If we do it too much, eventually when we scream that the wolf is at the door, we will be ignored, and see our data get eaten up...

Comments  (0)

Page « < 31 - 32 - 33 - 34 - 35 > »