Items Tagged with "Enterprise Security"


E6fba550184963cb20ac46502a1fa1ee

Social Engineering: What the Heck Was I Doing? Part 1

September 26, 2012 Added by:Will Tarkington

The method I used for this particular tactic was to monitor the conversational rhythm. Then inject into it and take it over allowing me to guide the conversation. The skill set that allows you to walk into a conversation and take it over can’t be understated...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Three Ways to Minimize Reputational Risk with Social Media

September 26, 2012 Added by:Brent Huston

One of the most difficult tasks for an organization is conveying the importance of discretion for employees who use social media. Not only are organizations at risk from having their networks attacked, but they must protect their reputation and proprietary ideas...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Accessibility and the Untold Issue Around Cloud Computing

September 26, 2012 Added by:Ben Kepes

The decision was made during the consultation process that universal design and accessibility issues should be outside the scope of the document. That was a necessary decision as the drive was to come up with a readily consumable document that vendors could easily comply with...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

The Face of Battle: Sir John Keegan and the Individual in Compliance

September 26, 2012 Added by:Thomas Fox

Compliance violation perpetrators will often grow the fraud in magnitude, sometimes increasing the number of participants. They will rarely cease on their own accord. This fits into Sir John’s analysis of the everyman of battle: What they did and how they did it...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Video: Do I Have to Secure All My Applications?

September 24, 2012

Attackers take advantage of any externally facing web application. If you think about a web application is not mission because it’s not touching data and if there is a SQL Injection vulnerability that exists in there attackers can use that to gain a foothold inside the network...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Security and the Enterprise: Connect What?

September 20, 2012 Added by:Tripwire Inc

We’re going to use the phrase “Connecting security to the business” with almost annoying frequency because it can change the way the business views security, and vice versa. This begs a primer of sorts: What do we mean by all this “connecting security to the business” talk?

Comments  (0)

0356a83ecb15c8e33b00560d7bebe47f

Some Simple Definitions for Risk and Security Discussions

September 19, 2012 Added by:Stephen Marchewitz

Every time I read something regarding the core terminology in security and risk management, I start to question whether they really know what they’re talking about. Even worse, some speak with so many words and such arrogance, I start question whether I know what I’m talking about...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Federal CIO Council Releases BYOD Toolkit

September 19, 2012 Added by:David Navetta

The BYOD movement, barring a black swan event, is likely to continue to gather steam – though not without detractors. And as the Toolkit notes, BYOD remains a nascent movement with real concerns and numerous issues to be worked through, along with the establishment of new practices...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Clipboards, Confidence, and Information Security

September 17, 2012 Added by:Tripwire Inc

How do you teach paranoia and suspicion? We often hire people because of their willingness to help others, their good communication skills, their ability to be responsive, etc. As we work through securing our humans, we need to strike a balance – trust but verify, assist but not unquestioningly...

Comments  (1)

59d9b46aa00c70238bb89056cfeb96c0

Compliance and Company Values from the Ground Up

September 17, 2012 Added by:Thomas Fox

For the compliance practitioner sometimes the biggest challenge is not only to get senior management but the troops in the trenches to embrace compliance. Cathy Choi's story is a powerful lesson of one way to get those troops to buy into what the compliance department is selling...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

CIOs Seek Value But See Challenges with Cloud Computing

September 16, 2012 Added by:Bill Gerneglia

The face of corporate IT changes dramatically with a move to the cloud – no longer do people need to spend time racking and stacking servers, patching software and other low level tasks – the fact is that in the long run individual organizations will not have email server administrators, desktop software support personnel or systems administrators...

Comments  (0)

37d5f81e2277051bc17116221040d51c

BYOD: Mobile Security Tips for Small Businesses

September 16, 2012 Added by:Robert Siciliano

If you choose to use your personal device for work purposes, at any time, for any reason, your employer will more than likely want control over that device. This means that, again, your employer may have remote capabilities to monitor activity wipe your device’s data...

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

Are Applications and Services on the Public Cloud Secure?

September 15, 2012 Added by:Rafal Los

Any application that was built to be secured independently of the environment will do as well in a public cloud as it did in your private data center. If you build the application to be low-risk independent of your environmental controls you shouldn't have to worry where it lives...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Protecting Your Data With Integrated Security Controls

September 11, 2012

The modern enterprise requires a new defense paradigm to protect their business from security threats. Not perimeter-based, but data-centric, and that can readily combine key information from multiple critical security controls to easily identify risks and threats and protect critical infrastructure and sensitive data...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Will the Rise of Tablets Affect Security Measures in the Workplace?

September 11, 2012 Added by:Robert Siciliano

While your company’s IT guy has a relative hold on the work laptops and desktops, and even some of the mobiles, he is quickly losing control when you bring your new Droid and connect it to the corporate network. Now he has to worry if that last app you downloaded will infect the network...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Internally Funding Your Compliance Program

September 11, 2012 Added by:Thomas Fox

Big banks are not doing too well these days in the compliance arena. From money-laundering operations for drug cartels to trading losses, big banks seem to be more in the news these days for compliance failures rather than successes...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »