Items Tagged with "Information Technology"


0a8cae998f9c51e3b3c0ccbaddf521aa

The Patchwork Cloud: Making the Security Case

May 05, 2012 Added by:Rafal Los

When we think about cloud computing we can think of security as getting a bit of a gentle push, or shove in some cases. The way it is built and billed as services instead of individual components, and the increased emphasis on automation - security has a real chance of not being a roadblock...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Unmasking Agility: Cloud Reality or Myth of Marketing Hype?

April 30, 2012 Added by:Rafal Los

Agility is the ability of the IT department to provide services that adapt to the changing needs of your organization faster than before, with on-premise servers, systems and staff. Increasing your business' agility means that IT has done something to contribute to a business...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

ENISA Seeks Experts for Permanent Stakeholders Group

April 26, 2012 Added by:Infosec Island Admin

The PSG will be composed of 30 leading experts in network and information security, and should represent the information and communications industry, consumer and user organizations, as well as academic and research institutions. Submit applications by April 30, 2012...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

On the Sustainability of Information Security

April 25, 2012 Added by:Rafal Los

The only way that information security can be a group of outliers is if we're considering ourselves within the entirety of the IT realm. While this would be great for my ego to think that myself and all my peers are just smarter than everyone else in IT, I know this to be false...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Good Security Starts at Home

April 23, 2012 Added by:Ben Rothke

Not a day goes by without yet another spate of privacy and security issues. Threats to the security, privacy and personal information continue to increase in scope and complexity. To maintain competitive edge, vendors and service providers are scrambling to keep up...

Comments  (22)

03b2ceb73723f8b53cd533e4fba898ee

China, Cyber Warfare and Challenges for the Future

April 09, 2012 Added by:Pierluigi Paganini

China's growing presence in cyber space will result in an increase in cyber operations against the nation. Due to the imbalance between an aggressive cyber offense its weak cyber defense capabilities, it could be the origin of significant technological problems for China...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

NIST: Technical Guidance for Evaluating Electronic Health Records

April 03, 2012 Added by:Infosec Island Admin

“This guidance can be a useful tool for EHR developers to demonstrate that their systems don’t lead to use errors... It will provide a way for developers and evaluators to objectively assess how easy their EHR systems are to learn and operate, while maximizing efficiency...”

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Cyber Criminals Top Secret Service Most Wanted List

April 02, 2012 Added by:Headlines

The majority of fugitives on the Secret Service's top ten most wanted list can be described as "cyber criminals". While the objectives remain the same, the ubiquity of the digital systems that pervade every aspect of our culture presents a new set of challenges for law enforcement...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Cloud Services Strategy: Security First - Growth Second

March 30, 2012 Added by:Richard Stiennon

Cisco, Juniper, Oracle, and Microsoft might have security initiatives and even good sales of security products. But security takes a back seat to functionality too often. Why are there no secure switches? Secure apps for Windows? Or secure databases?

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

GAO Report: IT Supply Chain Security Risks

March 30, 2012

The exploitation of information technology (IT) products and services through the global supply chain is an emerging threat that could degrade the confidentiality, integrity, and availability of critical and sensitive agency networks and data...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

CIOs See Growth in IT Budgets and Staff for 2012

March 27, 2012 Added by:Bill Gerneglia

After several years of stagnant or negative growth, most companies are now projecting a 3-4 percent increase in IT budgets and staffing for this year, which can be seen as acknowledgement that IT is critical if companies are to execute on their aggressive growth plans...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Public Key Infrastructure 1998 – 2012

March 25, 2012 Added by:Ben Rothke

PKI was and still is a powerful set of technologies. But it was a solution far ahead of its time. It was doomed by a lack of standards, interoperability issues, deployment complexities, and a level of complication that confounded even technologically competent end-users...

Comments  (1)

3e35900ae6facc6c146a85c435c71d82

Liars and Outliers: Enabling the Trust that Society Needs to Thrive

March 20, 2012 Added by:Ben Rothke

Liars and Outliers is an absolutely fascinating and groundbreaking book. In this election year where the candidates attempt to make sweeping simplistic promises to fix complex problems, Schneier simply answers that in our complex society, there are no simple answers...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

CIA and the Intelligence Components of Security

March 16, 2012 Added by:Pierluigi Paganini

We must approach with care the diffusion of technology, and correctly size up the potential threats. As there has been increased media attention on vulnerabilities within critical structures, the same approach must be followed to manage issues with commonly used devices...

Comments  (0)

6ba13f7544750cd81809eb83d296112a

Roundtable: Opportunities for HR in Consumerization of IT

March 15, 2012 Added by:Kyle Lagunas

Providing access to all sorts of internal systems for both employees and managers can make for a more adaptable organization regardless of size. IT has struggled with this loss of gatekeeper control, but the sound fiscal results are changing the minds of the C-suite...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US - UK Progress Towards a More Secure Cyberspace

March 15, 2012 Added by:Headlines

"We share an abiding commitment to keeping cyber-criminals from victimizing our citizens and weakening our trust in networked technology. Owing in part to our close partnership, it is harder than ever before for criminals to operate in cyberspace with impunity..."

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »