Policy

5e402abc3fedaf8927900f014ccc031f

How Do You Translate Information Security?

December 22, 2010 Added by:Allan Pratt, MBA

The bottom line is that we, as information security professionals, must speak with other business units in their own languages in order to explain the threats we deal with on a daily basis. Business units need to understand how their work can, and will, be affected when breaches happen...

Comments  (2)

49afa3a1bba5280af6c4bf2fb5ea7669

How to Weather the Outsourcing Storm

December 03, 2010 Added by:Mike Meikle

A quick overview, 2.8 million business support jobs lost since 2000, a large chunk of that being IT. Also IT stands to lose another 450k-500K jobs by the time 2014 rolls around. This is discussed in the eWeek article. InfoWorld points to the 500k IT jobs lost in 2008-2009 alone...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US and EU Partner on Cyber Wargames and Security Plans

November 24, 2010 Added by:Headlines

The US and EU recently conducted cyber wargames, and have announced plans to cooperate on addressing a range of cyber security issues. The security exercises included participants from the private sector, and were focused on coordinated responses to cyber-related threat scenarios...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Legislation to Give DHS Power Over Private Networks

November 19, 2010 Added by:Headlines

Proposed legislation in the House of Representatives would give the Department of Homeland Security new authority to enforce cyber security standards aimed at shoring up private sector computer networks considered critical to national security...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Internet Kill Switch Debate Still Very Alive

November 17, 2010 Added by:Headlines

Regardless of the outcome of the proposed legislation, in the case of a national emergency, Internet access will be marginal at best, and business continuity plans that rely heavily on the notion that employees will be able to login to corporate networks from home are severely flawed...

Comments  (0)

E2c407e8f2b2f7e67cf000863bd588da

Computer Security Incident Response - Part 3

November 16, 2010 Added by:John McGloughlin

The efficiency and effectiveness of the Security Operations Center (SOC) team depends on disciplined conduct, continuous communication, uniformed approach, low defect rates and positive attitudes. This team is the basis of a continuous effort to protect the assets of the corporation...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Irony - Administration Proposes Internet Privacy Czar

November 14, 2010 Added by:Headlines

It is ironic to think that an increase in government monitoring and policing of online activities will do anything to increase privacy for consumers. As a free society, we need to be careful about empowering federal bureaucracies in order to preserve individual freedoms...

Comments  (1)

16443e0c6f6e4a400fd0164b3c406170

Are You a Demanding User?

November 12, 2010 Added by:Christopher Burgess

When we raise our heads and look into our infrastructure, at times we are thwarted due to the lack of similar technology being availed or an information technology implementation policy standing between us and the new capability. The reality is, we aren't alone...

Comments  (0)

E2c407e8f2b2f7e67cf000863bd588da

Computer Security Incident Response - Part 2

November 10, 2010 Added by:John McGloughlin

If you’re part of a policy making body and maybe don’t have very much real world cyber-combat experience - don’t put together a flow chart for how to deal with a reconnaissance threat and hand it to the operational team. You’ll just piss them off and the objective will be lost...

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Federal Cyber Security: Are We Winning or Losing?

November 09, 2010 Added by:Jon Stout

The state of our cyber defense was summarized by Michael Chertoff when he concluded that it may take a digital 9-11 to get business, consumers and governments to fortify their cyber security defenses. In effect we are fighting an asymmetrical war and, at present, we appear to be losing...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Social Media, Infosec and the War on Drugs

November 08, 2010 Added by:Javvad Malik

More and more companies are finding their employee’s are addicted to the latest drug. A drug that is freely available and most addicts need to take several times a day. It’s the drug of social media.But what does this have to do with information security? Perhaps a bit more than you thought...

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

Five Ways to Create High Quality Security Policies

November 03, 2010 Added by:Robb Reck

Security policies are the foundation of an enterprise information security program. Without a solid foundation in place you simply cannot build a sturdy long-lasting structure; be it a building or a security program. Here are five things that can help you ensure your foundation is strong...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

Zero Trust Security – The Technical Discussion

November 02, 2010 Added by:PCI Guru

It takes strong leadership to keep security off of the back burner. Without that leadership, security will fall into a rut and an incident will occur. So while I think Zero Trust is probably the approach we should all work towards, it will take a lot of effort to make it a reality...

Comments  (1)

959779642e6e758563e80b5d83150a9f

Glorifying the Attackers and Prosecuting the Victims

October 29, 2010 Added by:Danny Lieberman

Translated to the world of security and compliance – we can understand that a basic component of data security in the workplace, is an ethical approach where we maintain a clear identification of who is the malicious attacker and deal with him in an uncompromising and harsh way...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

Zero Trust Security – The Cultural Discussion

October 28, 2010 Added by:PCI Guru

For what this approach requires is that you tell your employees that they cannot be trusted. If that does not scare the daylights out of you, it will sure scare it out of your human resources executives and probably a few, if not all, of the rest of your senior managers...

Comments  (2)

16443e0c6f6e4a400fd0164b3c406170

Security: So You Want to Work Remotely?

October 26, 2010 Added by:Christopher Burgess

You are no longer within the four walls of the employer, and you no longer have that physical security surrounding you and the assets. Your mobile environment by definition is physically outside their ability to monitor for the physical security threats which every office addresses...

Comments  (3)

Page « < 33 - 34 - 35 - 36 - 37 > »