Blog Posts Tagged with "Risk Mitigation"

92c1398d4414653ce3791460da01a2e4

Try Application White Listing to Mitigate Malware

May 03, 2012 Added by:Paul Paget

Unless you run a network that has no Internet connection and a “no disks” policy, the only way to against malware is to employ application white listing, which protects the software that controls the behavior of your computers. If the software is not on the white list, it won’t run...

Comments  (2)

A88973e7d0943d295c99820ab9aeed27

Protecting Data in Use

April 26, 2012 Added by:Simon Heron

The security of data in use is about risk mitigation. However, with the current targeted attacks and the proliferation of zero day threats, the risk level is high. It is necessary that action is taken to implement the required precautions that reduce the risk to an acceptable level...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Remote Deposit Capture (RDC) Could Escalate Fraud

November 22, 2011 Added by:Headlines

"With banks and financial institutions expanding this service to a retail customer base that often undergoes less stringent due diligence than do their commercial customers, is the potential for fraud increasing?"

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

Enterprise Information Security is About Progress

November 20, 2011 Added by:Robb Reck

Enterprise security is a service function. We exist to enable the business to do their jobs without being crippled by attacks and unreliable systems or losing trade-secrets to competitors. As soon as we stop enabling the business to produce better and faster, we become a liability...

Comments  (0)

C70bb5cfd0305c9d18312d92f820c321

The Chicken and the Pig - Three Security Genres

November 15, 2011 Added by:Gabriel Bassett

Engineering is required to provide operations the tools they need. Intel is needed to provide operations information to act. Counter-intel is needed to help operations slow the loss of information. Only when all areas are working in concert for the common operational goal, is security realized...

Comments  (0)

34f0cf280cbc950bcb75cabd189b7a8d

Webinar: How to Minimize the Risks of a Data Breach

October 21, 2011 Added by:Kanguru Solutions

Kanguru Solutions has teamed up with Cyber Data Risk Managers LLC to host a FREE webinar on cyber security and infosec entitled “How to Minimize the Risks of a Data Breach/Cyber Attack.” This free webinar will discuss data security, privacy and measures to take in the event of a data breach...

Comments  (0)

7c5c876d1933023ac375eead04302e1a

You Can't Buy DLP

June 13, 2011 Added by:Boris Sverdlik

To implement a data loss solution, you must take a holistic approach to identify the problem, threat vectors and vulnerabilities. You must understand where your sensitive data lives within your organization. This can’t be done with a tool, regardless of how good they claim it is...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

Top Ten Security Questions for CEOs to Ask

February 03, 2011 Added by:Headlines

Translating the jargon laden techno babble of information security into a language the CxO level can understand and find actionable is one of the biggest hurdles the infosec professional faces. In an article by Gary Loveland, the top ten questions CEOs need to ask about security issues are outlined...

Comments  (0)