Items Tagged with "Enterprise Security"


Bd07d58f0d31d48d3764821d109bf165

Security and the Enterprise: Connect What?

September 20, 2012 Added by:Tripwire Inc

We’re going to use the phrase “Connecting security to the business” with almost annoying frequency because it can change the way the business views security, and vice versa. This begs a primer of sorts: What do we mean by all this “connecting security to the business” talk?

Comments  (0)

0356a83ecb15c8e33b00560d7bebe47f

Some Simple Definitions for Risk and Security Discussions

September 19, 2012 Added by:Stephen Marchewitz

Every time I read something regarding the core terminology in security and risk management, I start to question whether they really know what they’re talking about. Even worse, some speak with so many words and such arrogance, I start question whether I know what I’m talking about...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Federal CIO Council Releases BYOD Toolkit

September 19, 2012 Added by:David Navetta

The BYOD movement, barring a black swan event, is likely to continue to gather steam – though not without detractors. And as the Toolkit notes, BYOD remains a nascent movement with real concerns and numerous issues to be worked through, along with the establishment of new practices...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Clipboards, Confidence, and Information Security

September 17, 2012 Added by:Tripwire Inc

How do you teach paranoia and suspicion? We often hire people because of their willingness to help others, their good communication skills, their ability to be responsive, etc. As we work through securing our humans, we need to strike a balance – trust but verify, assist but not unquestioningly...

Comments  (1)

59d9b46aa00c70238bb89056cfeb96c0

Compliance and Company Values from the Ground Up

September 17, 2012 Added by:Thomas Fox

For the compliance practitioner sometimes the biggest challenge is not only to get senior management but the troops in the trenches to embrace compliance. Cathy Choi's story is a powerful lesson of one way to get those troops to buy into what the compliance department is selling...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

CIOs Seek Value But See Challenges with Cloud Computing

September 16, 2012 Added by:Bill Gerneglia

The face of corporate IT changes dramatically with a move to the cloud – no longer do people need to spend time racking and stacking servers, patching software and other low level tasks – the fact is that in the long run individual organizations will not have email server administrators, desktop software support personnel or systems administrators...

Comments  (0)

37d5f81e2277051bc17116221040d51c

BYOD: Mobile Security Tips for Small Businesses

September 16, 2012 Added by:Robert Siciliano

If you choose to use your personal device for work purposes, at any time, for any reason, your employer will more than likely want control over that device. This means that, again, your employer may have remote capabilities to monitor activity wipe your device’s data...

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

Are Applications and Services on the Public Cloud Secure?

September 15, 2012 Added by:Rafal Los

Any application that was built to be secured independently of the environment will do as well in a public cloud as it did in your private data center. If you build the application to be low-risk independent of your environmental controls you shouldn't have to worry where it lives...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Protecting Your Data With Integrated Security Controls

September 11, 2012

The modern enterprise requires a new defense paradigm to protect their business from security threats. Not perimeter-based, but data-centric, and that can readily combine key information from multiple critical security controls to easily identify risks and threats and protect critical infrastructure and sensitive data...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Will the Rise of Tablets Affect Security Measures in the Workplace?

September 11, 2012 Added by:Robert Siciliano

While your company’s IT guy has a relative hold on the work laptops and desktops, and even some of the mobiles, he is quickly losing control when you bring your new Droid and connect it to the corporate network. Now he has to worry if that last app you downloaded will infect the network...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Internally Funding Your Compliance Program

September 11, 2012 Added by:Thomas Fox

Big banks are not doing too well these days in the compliance arena. From money-laundering operations for drug cartels to trading losses, big banks seem to be more in the news these days for compliance failures rather than successes...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Data Mobility and Security Biggest Cloud Computing Concern

September 10, 2012 Added by:Bill Gerneglia

BYOD issues continue to cause headaches for IT departments. Security mandates grow exponentially as they struggle to prevent data leaks from private networks onto public clouds. The biggest concerns with public clouds are the loss of data and control of the location of that data...

Comments  (1)

C787d4daae33f0e155e00c614f07b0ee

The Right Way to Handle Shrinking Budgets

September 09, 2012 Added by:Robb Reck

We add new security tools by seldom get rid of the old ones. So, it’s no surprise that when our companies require us to reduce our budgets we don’t really know how to do it. In the face of these tightening budgets we need to adapt and survive. This leaves us with three options...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Error Logs and Apollo 11: One Giant Step For Risk Management

September 09, 2012 Added by:Tripwire Inc

Although Neil Armstrong is the hero of the Apollo 11 story, the planning, management, complexity and technology for the mission is often overlooked. Iit were not for testing and assessing risks associated with the systems the lunar landing would not have been a success...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Keeping Safe In The Cloud

September 09, 2012 Added by:Ben Kepes

“With the cloud, you don’t own anything. You already signed it away through the legalistic terms of service with a cloud provider that computer users must agree to... the more we transfer everything onto the web, onto the cloud, the less we’re going to have control over it...”

Comments  (0)

099757b145caa6965ea51494adbc25ba

How to Secure Windows 2000... For a Limited Time

September 07, 2012 Added by:Drayton Graham

A number of organizations are still using Windows 2000. It is up to the organization to determine the acceptable risk for continued use of Windows 2000-based systems. If Windows 2000 is a necessity at this time within your environment, here are some security techniques you can implement...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »