Blog Posts Tagged with "Information Technology"


Defending the Enterprise - Five Corporate Security Challenges

February 08, 2012 Added by:Rafal Los

You have to keep close tabs on your employees, your friends, your enemies and those you would never suspect, because threats are ever-present and overwhelming. Keep a level-head, because the evolution of threat doesn't mean it's any more scary today than yesterday...

Comments  (0)


Bluetooth Security: Be Wary

February 07, 2012 Added by:Theresa Payton

Many of us use and love Bluetooth technology. It’s easy to set up and convenient to use. But you might want to think twice about what you use it for because that easy connection for you can also be an easy connection for a cybercreep...

Comments  (4)


Doom, Gloom, and Infosec

February 06, 2012 Added by:Dave Shackleford

I’m perennially happy, but I get the impression that many in infosec are not. Everyone is different, and I don’t want to stereotype, but I do run into a lot of gloomy folks. Why is the infosec profession so unhappy in general?

Comments  (1)


Paper Clarifies PaaS for Federal IT Buyers

February 06, 2012 Added by:Kevin L. Jackson

“Whereas the first wave of cloud computing was about consolidating data centers, the PaaS wave is about consolidating applications. It will be a more complex ride, but the savings will be greater...”

Comments  (0)


The Valley of Death Between IT and Security

February 03, 2012 Added by:Danny Lieberman

Truly – the essence of security is protecting the people who use a company’s products and services. What utility is there in running 24×7 systems that leak 4 million credit cards or developing embedded medical devices that may kill patients?

Comments  (0)


Senate Testimony: Cyber Security as a Strategic Concern

February 02, 2012 Added by:Headlines

Testimony offered before the Senate Select Committee on Intelligence included threats to cybersecurity, the third item addressed, signifying that intrusions by state-sponsored China and Russia and independent actors like Anonymous and Lulzsec continue to be a concern...

Comments  (0)


Master the Cloud, Montréal: Notes from the Road...

January 31, 2012 Added by:Rafal Los

Cloud computing provides the customer an unparalleled chance to jump into a new computing paradigm which sheds some of the legacy issues and the excessive costs associated with unused capacity most of our organizations have humming along in our data centers...

Comments  (0)


Tech Continues to Bedevil Infosec and Privacy Practitioners

January 30, 2012 Added by:Rebecca Herold

Organizations need to get off the stick, do risk assessment to determine the extent of personal computing device use within their organizations and then update their policies, create new procedures, and implement new technologies accordingly...

Comments  (0)


IT Security Issues for 2012

January 27, 2012 Added by:Simon Heron

The pace of technological innovation is getting faster. At the same time, the work place is changing significantly, driven by organizations’ need to be more competitive and efficient. These two factors mean that there is a lot of change on the horizon for 2012...

Comments  (0)


E-Meme: The Next Generation of Thought Crime Detection?

January 25, 2012 Added by:Infosec Island Admin

An Orwellian software development project that the Navy has invested in called “E-MEME” will be able to sift through the internet for ideas and meme’s to analyze them for predictive behavior assessment. Predictive behavioral analysis via meme’s... Whatever could go wrong?

Comments  (6)


Can You Explain Encryption to Me?

January 23, 2012 Added by:Javvad Malik

I assumed that senior technology managers would have half a clue about technology. I have thought long and hard about this and think the easiest way to explain this would be to replace the word encryption with witchcraft. It too is misunderstood by the masses...

Comments  (4)


GSA Final Rule Requires Vendor Proof of Security

January 10, 2012 Added by:Headlines

The rule requires contractors and subcontractors to provide details on how their products and services meet federal IT regulations. The rule also requires contractors and subcontractors to submit to audits on practices and procedures to ensure mandates are satisfied...

Comments  (1)


Gartner: Top Predictions for 2012 and Beyond

January 02, 2012 Added by:Bill Gerneglia

"Instead of requesting that a third-party security vendor conduct testing on the enterprise's behalf, the enterprise will be satisfied by a cloud provider's certificate stating that a reputable third-party security vendor has already tested its applications."

Comments  (0)


Autumn Spring: A Philosophical Look at the Internet

December 28, 2011 Added by:Richard Thieme

Internet pioneers such as J. C. R. Licklider, saw what would happen when we plugged computers into one another: We will live in a human-computer symbiosis, a coupling of symbol-manipulating networks that will be much greater than the sum of its parts...

Comments  (0)


IT Trends for 2011 and Beyond

December 25, 2011 Added by:Bill Gerneglia

CIOs and senior IT business decision makers must maintain a focus on specific trends that will effect the industries in which they compete. You should already be thinking about how technology is going to help shape your business far into the future. CIOs have to be forward-thinking...

Comments  (0)


Spotting an Information Hoarder

November 08, 2011 Added by:Joel Harding

Information is power. Those who control information understand they wield a very powerful tool, they share information with only those they decide need to see that information. One who controls information within an organization can manipulate others, whether consciously or unconsciously...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »