Items Tagged with "Information Technology"


New Opportunities for Cyber Espionage and Cyber Crime

March 08, 2012 Added by:Pierluigi Paganini

Computer fraud, phishing, and malware development designed to steal sensitive information from users, the use of advanced persistent threats, ramsonware, and cyber espionage are all activities united by the intent to profit from the improper use of technology...

Comments  (0)


NIST Pursues Health Record System Usability Testing

February 22, 2012 Added by:Infosec Island Admin

The National Institute of Standards and Technology (NIST) seeks manufacturers of electronic health record (EHR) systems to participate in a research effort to develop methods for assessing the usability of health information systems...

Comments  (1)


Responsibility vs Capability in the CISO Role

February 17, 2012 Added by:Rafal Los

Capability is often seen as the ability to enforce - whether its corporate politics, budget, or a top-down reporting structure. If you don't have the capability to force people to follow organization-wide decisions it is difficult to have a solid organization...

Comments  (0)


Defending the Enterprise - Five Corporate Security Challenges

February 08, 2012 Added by:Rafal Los

You have to keep close tabs on your employees, your friends, your enemies and those you would never suspect, because threats are ever-present and overwhelming. Keep a level-head, because the evolution of threat doesn't mean it's any more scary today than yesterday...

Comments  (0)


Bluetooth Security: Be Wary

February 07, 2012 Added by:Theresa Payton

Many of us use and love Bluetooth technology. It’s easy to set up and convenient to use. But you might want to think twice about what you use it for because that easy connection for you can also be an easy connection for a cybercreep...

Comments  (4)


Doom, Gloom, and Infosec

February 06, 2012 Added by:Dave Shackleford

I’m perennially happy, but I get the impression that many in infosec are not. Everyone is different, and I don’t want to stereotype, but I do run into a lot of gloomy folks. Why is the infosec profession so unhappy in general?

Comments  (1)


Paper Clarifies PaaS for Federal IT Buyers

February 06, 2012 Added by:Kevin L. Jackson

“Whereas the first wave of cloud computing was about consolidating data centers, the PaaS wave is about consolidating applications. It will be a more complex ride, but the savings will be greater...”

Comments  (0)


The Valley of Death Between IT and Security

February 03, 2012 Added by:Danny Lieberman

Truly – the essence of security is protecting the people who use a company’s products and services. What utility is there in running 24×7 systems that leak 4 million credit cards or developing embedded medical devices that may kill patients?

Comments  (0)


Senate Testimony: Cyber Security as a Strategic Concern

February 02, 2012 Added by:Headlines

Testimony offered before the Senate Select Committee on Intelligence included threats to cybersecurity, the third item addressed, signifying that intrusions by state-sponsored China and Russia and independent actors like Anonymous and Lulzsec continue to be a concern...

Comments  (0)


Master the Cloud, Montréal: Notes from the Road...

January 31, 2012 Added by:Rafal Los

Cloud computing provides the customer an unparalleled chance to jump into a new computing paradigm which sheds some of the legacy issues and the excessive costs associated with unused capacity most of our organizations have humming along in our data centers...

Comments  (0)


Tech Continues to Bedevil Infosec and Privacy Practitioners

January 30, 2012 Added by:Rebecca Herold

Organizations need to get off the stick, do risk assessment to determine the extent of personal computing device use within their organizations and then update their policies, create new procedures, and implement new technologies accordingly...

Comments  (0)


ENISA Report on Network Information Security in Education

January 30, 2012

ENISA's Report on Network Information Security in Education comes at a time when education and ITC are interconnected more than ever. The challenge of the digitally active citizen is to remain informed on the news coming from the dynamic field of Information Security...

Comments  (2)


IT Security Issues for 2012

January 27, 2012 Added by:Simon Heron

The pace of technological innovation is getting faster. At the same time, the work place is changing significantly, driven by organizations’ need to be more competitive and efficient. These two factors mean that there is a lot of change on the horizon for 2012...

Comments  (0)


E-Meme: The Next Generation of Thought Crime Detection?

January 25, 2012 Added by:Infosec Island Admin

An Orwellian software development project that the Navy has invested in called “E-MEME” will be able to sift through the internet for ideas and meme’s to analyze them for predictive behavior assessment. Predictive behavioral analysis via meme’s... Whatever could go wrong?

Comments  (6)


Can You Explain Encryption to Me?

January 23, 2012 Added by:Javvad Malik

I assumed that senior technology managers would have half a clue about technology. I have thought long and hard about this and think the easiest way to explain this would be to replace the word encryption with witchcraft. It too is misunderstood by the masses...

Comments  (4)


GSA Final Rule Requires Vendor Proof of Security

January 10, 2012 Added by:Headlines

The rule requires contractors and subcontractors to provide details on how their products and services meet federal IT regulations. The rule also requires contractors and subcontractors to submit to audits on practices and procedures to ensure mandates are satisfied...

Comments  (1)

Page « < 2 - 3 - 4 - 5 - 6 > »