Blog Posts Tagged with "Management"

0a8cae998f9c51e3b3c0ccbaddf521aa

Surviving the Annual Holiday Production Freeze

December 19, 2010 Added by:Rafal Los

Testing is often the difference between "we thought we were safe" and "we were safe" this holiday season. With potentially billions of dollars being spent online this holiday season - can you afford to leave it to chance?

Comments  (1)

21d6c9b1539821f5afbd3d8ce5d96380

Vivek Kundra's 25 Point IT Management Reform Program

December 15, 2010 Added by:Kevin L. Jackson

The shift to “light technologies,” that is, cloud services, which can be deployed rapidly, and shared solutions will result in substantial cost savings, allowing agencies to optimize spending, and allowing agencies to reinvest in their most critical mission needs...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Security Strategy: From Requirements to Reality

December 13, 2010 Added by:Ben Rothke

Without a deeply embedded structured approach to security systems design, Anderson argued that we find ourselves in the situation we are in today, with applications and operating systems full of bugs, vulnerabilities and other serious security flaws...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Five Important Fraud Investigation Interview Tips

December 03, 2010 Added by:Thomas Fox

A successful investigation interview isn’t just a question and answer period. Asking good questions is just a small piece of a very big puzzle. To get the most out of your fraud investigation interviews, remember these 5 important steps...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Enterprise Security: Keeping Up With the Joneses

November 17, 2010 Added by:Javvad Malik

No company wants to be that company with lame security which continually loses data, gets hacked and fined by regulators. But then neither does any company really have unlimited budget to implement the total number of security controls they need. They simply keep up with the Joneses...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Social Media, Infosec and the War on Drugs

November 08, 2010 Added by:Javvad Malik

More and more companies are finding their employee’s are addicted to the latest drug. A drug that is freely available and most addicts need to take several times a day. It’s the drug of social media.But what does this have to do with information security? Perhaps a bit more than you thought...

Comments  (0)

4ff49873e3fed9a24adf0d37ae00b780

Will A Security Conference Help Your Company?

November 04, 2010 Added by:Lee Munson

Why send your IT staff to a conference? Security conferences are a place where both white and black hat hackers come out to show what they have discovered over the past year. The one thing that a hacker cares about more than money in this world is respect from his peers...

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

Five Ways to Create High Quality Security Policies

November 03, 2010 Added by:Robb Reck

Security policies are the foundation of an enterprise information security program. Without a solid foundation in place you simply cannot build a sturdy long-lasting structure; be it a building or a security program. Here are five things that can help you ensure your foundation is strong...

Comments  (0)

9259e8d30306ac2ef4c5dd1936e67634

Business Continuity Implementation Webinar

November 01, 2010 Added by:Dejan Kosutic

This free one-hour training is designed for organizations that plan to implement BS 25999-2. This session will explain all the steps in business continuity implementation according to BS 25999-2 standard, and provide tips on how to proceed with this complex task...

Comments  (0)

F520f65cba281c31e29c857faa651872

CEOs and CIOs: Partnering for Success

October 07, 2010 Added by:Rahul Neel Mani

A new generation of CEOs — not necessarily young but innovative —have embraced CIOs as strategic business peers. Charles Cadell, CEO, Lowe Lintas India is certainly one of them. In an interview with Ashwani Mishra, Cadell shares his thoughts on the role and expectations from his CIO...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

On Security and Motivation

October 04, 2010 Added by:Javvad Malik

There probably aren’t many companies who practice good security just for the sake of security. Security is driven by other objectives such as trying to impress another company so as to win business, because the regulators told them they had to, or because a rival company had just been breached...

Comments  (1)

Ebb72d4bfba370aecb29bc7519c9dac2

End of An Era: HP Acquires ArcSight

September 24, 2010 Added by:Anton Chuvakin

The last independent software SIEM worth buying was acquired. The biggest SIEM game winner ArcSight was acquired by HP for about $1.5b. As people are already calling me en masse to comment, here is a post with a random sampling of conclusions, predictions and lessons learned...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Why CIOs Should Know the Way

September 17, 2010 Added by:Bill Gerneglia

Executives at every level have to endure an annual review and answer two core questions: What have you done to earn your keep and what are you going to do in the near future, especially since - in the case of CIOs - your job of ensuring operational excellence in IT has gone by the boards?

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

E-Discovery: Other Shoe Drops in Adams v. Dell

August 25, 2010 Added by:David Navetta

In one of the most watched and controversial electronic discovery cases from 2009, the federal court in Utah held that the defendant Asus Computer International had violated their duty to keep certain electronic and paper documents relevant to a federal action for alleged patent infringement...

Comments  (0)

14a516a8718c6b0a09598ac4f2777124

Why Infosec Languishes, Part II

October 28, 2009 Added by:Jim Anderson

Although external forces including economic downturn and market specific slowdowns do have their impact, these external forces alone often cannot explain why information security makes so little progress.   This phenomenon is often true even in situations where senior infosec leadership is experienced, holds multiple certifications, and otherwise commands an excellent grasp of the multip...

Comments  (0)

14a516a8718c6b0a09598ac4f2777124

Why Infosec Languishes, Part 1

October 05, 2009 Added by:Jim Anderson

This subject has been simmering for a long time but the events of the unfolding economic crisis and so many colleagues and acquaintances in the industry who have suffered substantially in their efforts to advance information security within their organizations have prompted me to organize my thoughts in this area.

Comments  (1)

Page « < 4 - 5 - 6 - 7 - 8 > »