Items Tagged with "Security Strategies"


59d9b46aa00c70238bb89056cfeb96c0

Pink Floyd’s "The Wall" and Compliance

June 12, 2012 Added by:Thomas Fox

Compliance: One of the most important things is that sometimes you just hit a brick wall. You can carefully plan a strategy, implement the planned strategy and then measure the results, but it can still fall completely flat. In other words, you hit the proverbial wall...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

What's in a Name: Does DevOps Need a Security Flavor?

June 12, 2012 Added by:Rafal Los

Lots of folks are trying to remove bottlenecks between development and deployment within an organization to get IT to a more agile state. Every once in a while someone talks about security - I've been trying to figure out whether and how we should be discussing the DevOps and security relationship...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Five Things a Healthcare CIO Can Do to Improve Security

May 31, 2012 Added by:Danny Lieberman

In a complex healthcare organization, large scale security awareness training is a hopeless waste of resources considering the increasing number of options that people have (Facebook, smartphones..) to cause damage to the business. Security awareness will lose every time it comes up against an iPad or Facebook...

Comments  (0)

94c7ac665bbf77879483b04272744424

The Virtual Sky is Falling!

May 28, 2012 Added by:Marc Quibell

Opportunists are using an alarmists strategy, bolstered by bloated opinions, to get you to buy their stuff. IT Sec businesses and vendors are not objective sources for security trends, threats and/or events. They are advertisements...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Melville's "Bartleby the Scrivener" and Infosec

May 26, 2012 Added by:Rafal Los

Bottom line is, you won't be able to force change no matter how much you yell, scream, or try to scare the leadership. Better security is a cultural change, it's a change that must be adopted for a purpose or organizational goal. Otherwise, you're throwing rocks against a brick wall...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

Is Security Broken? How I Propose to Fix It...

May 23, 2012 Added by:PCI Guru

In a true war, we would be investing in creating an offensive capability to go into cyber-battle with the enemy. And while there are discussions about having offensive capabilities, security professionals are still in a defensive posture protecting the organization...

Comments  (2)

C787d4daae33f0e155e00c614f07b0ee

CISO 2.0: Enterprise Umpire or Wide Receiver?

May 21, 2012 Added by:Robb Reck

In security, our challenge to demonstrate to the business that the money they invest in us goes further than just keeping us out of the newspaper. Security can deliver tangible benefits out to the business. An effective security program can reduce the costs of creating products...

Comments  (2)

9f19bdb2d175ba86949c352b0cb85572

Who Are You Preaching to Anyway?

May 15, 2012 Added by:Neira Jones

Hard core security conferences continue to happen and continue to be successful, and long may it continue. We still need the techies to make sure we have the right tech to support the people and processes in our businesses. We also need the techies to try and keep ahead of the bad guys...

Comments  (2)

Da9f2c6651b84f7db75ae55d6e372103

Securing Your Company Against BYOD-Created Threats

May 14, 2012 Added by:Ashley Furness

The increasing emergence of Bring Your Own Device (BYOD) policies has both good and bad implications. Here are four strategies your company should implement to keep data secure while supporting employees' choice to use their own laptops, smartphones and tablets in the workplace...

Comments  (3)

E11e506024f5d2b70f037b9af4734f33

ENISA: National Cyber Security Strategies Analysis

May 09, 2012

To assist in the important task of developing and maintaining a successful national cyber security strategy, ENISA is developing a Good Practice Guide which will present good practices and recommendations on how to develop, implement and maintain a cyber security strategy...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Breached! Now What? Seven Steps to Avoid Failure Panic

May 07, 2012 Added by:Rafal Los

To many organizations, a security breach means a catastrophic failure in security signifying a breakdown in the mechanisms installed to keep the organization secure, and by its very nature represents failure. The problem with this situation is it really represents two failures...

Comments  (1)

E313765e3bec84b2852c1c758f7244b6

Information Security is More than Prevention

May 04, 2012 Added by:Brent Huston

One of the biggest signs that an organization’s infosec program is immature is they have an obsessive focus on prevention and equate it with security through knee-jerk reactions to vulnerabilities, never-ending emergency patching situations and a continual fire-fighting mode...

Comments  (0)

92c1398d4414653ce3791460da01a2e4

Try Application White Listing to Mitigate Malware

May 03, 2012 Added by:Paul Paget

Unless you run a network that has no Internet connection and a “no disks” policy, the only way to against malware is to employ application white listing, which protects the software that controls the behavior of your computers. If the software is not on the white list, it won’t run...

Comments  (2)

Fc152e73692bc3c934d248f639d9e963

The Fort Knox Approach to Security

April 23, 2012 Added by:PCI Guru

Most of you are protecting everything with equal rigor. Does everything need to be protected with the same thoroughness? Probably not and that is what makes infosec a difficult occupation. We neglect to delineate what needs the most protection and what does not need as much or any...

Comments  (0)

Ebe141392ea3ebf96ba918c780ea1ebe

The Security Poverty Line and Junk Food

April 16, 2012 Added by:Wendy Nather

Organizations below the security poverty line tend to be inordinately dependent on third parties and have less direct control over the security of the systems they use. They end up ceding risk decisions to third parties that they ideally should be making themselves...

Comments  (2)

0a8cae998f9c51e3b3c0ccbaddf521aa

Shadow IT - Why Security is Scrambling to Reinvent Itself

April 16, 2012 Added by:Rafal Los

Shadow IT is the leading cause of many of the "reinventions" that IT organizations across the globe are going through. For many CIOs the ground is moving underneath their feet, and if they're not actively moving to counter it, there are some very serious consequences...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »