Policy

E2c407e8f2b2f7e67cf000863bd588da

Computer Security Incident Response - Part 2

November 10, 2010 Added by:John McGloughlin

If you’re part of a policy making body and maybe don’t have very much real world cyber-combat experience - don’t put together a flow chart for how to deal with a reconnaissance threat and hand it to the operational team. You’ll just piss them off and the objective will be lost...

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Federal Cyber Security: Are We Winning or Losing?

November 09, 2010 Added by:Jon Stout

The state of our cyber defense was summarized by Michael Chertoff when he concluded that it may take a digital 9-11 to get business, consumers and governments to fortify their cyber security defenses. In effect we are fighting an asymmetrical war and, at present, we appear to be losing...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Social Media, Infosec and the War on Drugs

November 08, 2010 Added by:Javvad Malik

More and more companies are finding their employee’s are addicted to the latest drug. A drug that is freely available and most addicts need to take several times a day. It’s the drug of social media.But what does this have to do with information security? Perhaps a bit more than you thought...

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

Five Ways to Create High Quality Security Policies

November 03, 2010 Added by:Robb Reck

Security policies are the foundation of an enterprise information security program. Without a solid foundation in place you simply cannot build a sturdy long-lasting structure; be it a building or a security program. Here are five things that can help you ensure your foundation is strong...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

Zero Trust Security – The Technical Discussion

November 02, 2010 Added by:PCI Guru

It takes strong leadership to keep security off of the back burner. Without that leadership, security will fall into a rut and an incident will occur. So while I think Zero Trust is probably the approach we should all work towards, it will take a lot of effort to make it a reality...

Comments  (1)

959779642e6e758563e80b5d83150a9f

Glorifying the Attackers and Prosecuting the Victims

October 29, 2010 Added by:Danny Lieberman

Translated to the world of security and compliance – we can understand that a basic component of data security in the workplace, is an ethical approach where we maintain a clear identification of who is the malicious attacker and deal with him in an uncompromising and harsh way...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

Zero Trust Security – The Cultural Discussion

October 28, 2010 Added by:PCI Guru

For what this approach requires is that you tell your employees that they cannot be trusted. If that does not scare the daylights out of you, it will sure scare it out of your human resources executives and probably a few, if not all, of the rest of your senior managers...

Comments  (2)

16443e0c6f6e4a400fd0164b3c406170

Security: So You Want to Work Remotely?

October 26, 2010 Added by:Christopher Burgess

You are no longer within the four walls of the employer, and you no longer have that physical security surrounding you and the assets. Your mobile environment by definition is physically outside their ability to monitor for the physical security threats which every office addresses...

Comments  (3)

959779642e6e758563e80b5d83150a9f

Why Software Patents Are a Bad Idea

October 26, 2010 Added by:Danny Lieberman

The problem with software patents goes far beyond being an abstract mathematical algorithm or not, since most software is about ways of doing business or implementing consumer electronics, as opposed to innovative computational algorithms...

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

Chinese Hackers, Russian Cyber Crime and American Apathy

October 25, 2010 Added by:Dan Dieterle

Many American businesses and home users don’t focus on securing their systems, or simply don’t care. You have 2 to 15 guys protecting your network; they have the manpower to task 1,000 hackers to penetrating your system if you have something they want. Who is going to win that battle?

Comments  (7)

A88973e7d0943d295c99820ab9aeed27

UK Declares Cybercrime Growing Threat

October 20, 2010 Added by:Simon Heron

It is interesting that the UK Government seems to be taking the threat of cybercrime more seriously now, especially when you consider the spending review currently underway. Let’s hope that action is taken as a result of the strategy and that it is long term and persistent...

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

Should US Apply Cold War Doctrines to Cyber War?

October 18, 2010 Added by:Dan Dieterle

Where many times cyber attacks are more espionage related, they could turn deadly if power, telecommunications or infrastructure is damaged in a large city. Civil security, medical and food supply could be the heaviest hit...

Comments  (3)

1f2f664e68a603b3c54890fbbcd37857

UK National Security Strategy Published

October 18, 2010 Added by:Mark Gardner

The UK Government published their National Security Strategy. This placed hostile attacks upon UK cyberspace by other states and large scale cybercrime on the same level as International Terrorism, and International Military threats...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Reining In Enterprise Mobile Computing Risks

October 07, 2010 Added by:Rebecca Herold

As demonstrated over and over again over the past several years, mobile computing devices and storage media present a huge risk to business and personal information. It is vital that an effective mobile computing device and storage media security and privacy management program is in place...

Comments  (0)

8845ac2b3647d7e9dbad5e7dd7474281

Consumerization of IT and Enterprise Evolution

October 05, 2010 Added by:Phil Agcaoili

We have a problem with new disruptive technology and we need to treat all endpoint systems as hostile. New consumer technology that's brought into the workplace (a trend known as consumerization of IT), the consumer use of free or low-cost cloud services for the connected online life, and the enterprise shift towards the cloud for vertical business applications are rapidly affecting the way worker...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

On Security and Motivation

October 04, 2010 Added by:Javvad Malik

There probably aren’t many companies who practice good security just for the sake of security. Security is driven by other objectives such as trying to impress another company so as to win business, because the regulators told them they had to, or because a rival company had just been breached...

Comments  (1)

Page « < 33 - 34 - 35 - 36 - 37 > »