Blog Posts Tagged with "Enterprise Security"

0a8cae998f9c51e3b3c0ccbaddf521aa

Enterprise Resilience: Healthcare Edition (Part 1: Challenges)

October 21, 2012 Added by:Rafal Los

Organizations that make up the small to medium enterprise market are finding themselves in trouble as they are appearing on a lot of radar screens for attack, yet can't seem to find the resources they need to defend themselves adequately. Lots of challenges present around that point, to start off with...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Employers Must Consider Social Media Risks

October 17, 2012 Added by:David Navetta

One should assume that any information purportedly protected by privacy settings could still be viewed by strangers. And t is difficult to authenticate “friends” on a social network – they may be impersonators looking to scrape sensitive information from the ”private” online posts...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

James Bond at 50 – A Compliance Conversation in English and American

October 15, 2012 Added by:Thomas Fox

Maybe it’s just the difference in the two cultures; in the UK, they are trying figure out how and why compliance failures occurred and change the compliance culture so they can obey the law. In the US, businesses want to change the law so the conduct companies engage in will no longer violate the law...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Popularizing the Lone (Security) Wolf

October 14, 2012 Added by:Tripwire Inc

It’s interesting to me that as a security industry (a subset of the larger computer industry), we talk at our conferences about how stress and burnout come from always being on the front line, feeling isolated, unable to relax; and we draw parallels to how strange our industry is in this way...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Brittle Systems - Unmasking Enterprise Security's Quiet Danger

October 13, 2012 Added by:Rafal Los

Besides all the obvious security vulnerabilities in your enterprise there is an even bigger problem lurking just below the water. At that intersection between critical system and security vulnerability is something many IT professionals acknowledge as the big pink elephant in the room - the "brittle system"...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

CISO Lessons Learned

October 11, 2012 Added by:Tripwire Inc

The lessons they learn are not just from traditional infosec forensics – they also look at other parts of the business who contributed to the issue, were impacted by the incidents, or who were involved in response – and their learnings can include virtually any aspect of the chain of event...

Comments  (0)

1de705dde1cf97450678321cd77853d9

Somewhere Over The Rainbow – A Story About A Global Ubiquitous Record of All Things Incident

October 10, 2012 Added by:Ian Tibble

Most businesses don’t even know they were hacked until a botnet command and control box is owned by some supposed good guys somewhere, but all talk of security is null and void if we acknowledge reality here. So let’s not talk reality...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Ponemon Statistics on Cost of Cybercrime for 2012

October 10, 2012 Added by:Pierluigi Paganini

The research presents an alarming scenario, every company is daily the victim of attacks from malware to DDoS with dramatic consequences. Data breaches, system destruction and the violation of networks are the most common, estimated an averaging 1.8 successful attack each week...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

What’s Your Horizon of Focus for Security?

October 09, 2012 Added by:Tripwire Inc

In the corporate world, we talk a lot about corporate goals & objectives. In the US Government, you hear a lot about “The Mission,” which is the unifying goal that ties an agency (or multiple agencies) together in a shared sense of purpose. I’m a big believer in connecting our actions as information security professionals to The Mission...

Comments  (0)

0356a83ecb15c8e33b00560d7bebe47f

Ten Musts for a Good Security Risk Equation

October 08, 2012 Added by:Stephen Marchewitz

For those of you that have taken steps to build a security risk management program, sooner or later you will come to the point where you have to start quantifying risk in some meaningful way. So here are ten qualities to assess your choices against...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

CEO Hubris and Compliance Catastrophes

October 08, 2012 Added by:Thomas Fox

Even in this age of documenting, checking, measuring, stress testing and reassessing every conceivable type of risk, what is the one which is never tested? She believes that the answer is “the chief executive gets so high on power that he or she losses the plot...”

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

BYOD Trend Grows as Security Issues Escalate

October 07, 2012 Added by:Bill Gerneglia

The report found that the majority of employee’s phones and smart devices did not have any form of security software loaded nor were company materials protected. The new report provides detailed assessments of the mobile security threat and the growing market for security solutions...

Comments  (1)

E313765e3bec84b2852c1c758f7244b6

Ask The Experts: Workstation Malware

October 04, 2012 Added by:Brent Huston

Once we’ve embraced the fact that we need better detection and response mechanisms, we start to see how honeypots can help us but also how creating better awareness within our users can be the greatest investment an organization might make in detection...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Navigating Social Media Legal Risks: Safeguarding Your Business

October 03, 2012 Added by:Ben Rothke

Social media makes it easy for organizations to find and retain customers and increase sales, amongst many other benefits. At the same time, it can expose an organization to significant and highly-expensive legal risks and issues, and find themselves at the receiving end of a subpoena...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Five Tips for CISOs Presenting to the Board

October 01, 2012 Added by:Tripwire Inc

As security is becoming more important in the overall risk posture of organizations, boards are becoming more interested hearing directly from security executives which requires a different level of communication that CISO/CSOs may not be used to presenting...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Revising Your Code of Conduct: Don’t Wait

September 30, 2012 Added by:Thomas Fox

The backbone of the revision process is how your company captures, collaborates and preserves “all of the comments, notes, edits and decisions during the entire project," and you should assess “the best application to launch your Code and whether it includes a certification process..."

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »