Items Tagged with "Information Technology"


44fa7dab2a22dc03b6a1de4a35b7834a

Gartner: Top Predictions for 2012 and Beyond

January 02, 2012 Added by:Bill Gerneglia

"Instead of requesting that a third-party security vendor conduct testing on the enterprise's behalf, the enterprise will be satisfied by a cloud provider's certificate stating that a reputable third-party security vendor has already tested its applications."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Secure Communications for CERTs and Stakeholders

December 29, 2011

ENISA seeks to identify the most suitable technology and platform to provide secure channels to improve communications with CERTs and other stakeholders. Secure transportation of information assures some combination of confidentiality, integrity and authenticity of the data...

Comments  (0)

29cf3ef0a3104bccc62f3387739c1ca6

Autumn Spring: A Philosophical Look at the Internet

December 28, 2011 Added by:Richard Thieme

Internet pioneers such as J. C. R. Licklider, saw what would happen when we plugged computers into one another: We will live in a human-computer symbiosis, a coupling of symbol-manipulating networks that will be much greater than the sum of its parts...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

IT Trends for 2011 and Beyond

December 25, 2011 Added by:Bill Gerneglia

CIOs and senior IT business decision makers must maintain a focus on specific trends that will effect the industries in which they compete. You should already be thinking about how technology is going to help shape your business far into the future. CIOs have to be forward-thinking...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

ENISA on Cyber Security: Future Challenges and Opportunities

December 13, 2011

Our society has become irreversibly dependent on Information and Communication Technologies (ICTs). Unfortunately, the adoption of them has been accompanied by the development of a new set of cyber threats which are developing in ever more rapid, sophisticated and sinister ways...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Spotting an Information Hoarder

November 08, 2011 Added by:Joel Harding

Information is power. Those who control information understand they wield a very powerful tool, they share information with only those they decide need to see that information. One who controls information within an organization can manipulate others, whether consciously or unconsciously...

Comments  (0)

29cf3ef0a3104bccc62f3387739c1ca6

Why We Are All Getting a Little Crazy

November 03, 2011 Added by:Richard Thieme

The task of counterintelligence is to figure out what the other side is doing and how they are deceiving us. CI is predicated on double deceiving and triple deceiving the other side into believing fictions nested within fictions, always leavened with some facts, just enough to seem real...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

The Apocalypse Cycle: Preparing for Infrastructure Failure

November 02, 2011 Added by:Infosec Island Admin

The snow storm in October made me once again ponder my own readiness with regard to how to handle infrastructure failures. These same events have shown me just how clueless all too many people are about how to survive when their infrastructure goes down for any extended period of time...

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

The Other Top Issues Facing Computer Security

October 27, 2011 Added by:Dan Dieterle

There is a disconnect between management and IT. Sometimes management doesn’t fully understand what the IT department is doing. Veteran computer personal are being removed from companies – “due to cutbacks”, only to be replaced shortly thereafter by inexperienced or even temporary workers...

Comments  (0)

37d5f81e2277051bc17116221040d51c

What Are Your Digital Assets Worth?

October 21, 2011 Added by:Robert Siciliano

According to Consumer Reports, malware destroyed 1.3 million personal computers and cost consumers $2.3 billion in the last year. With the increased popularity of tablets, smartphones, and Macs, threats are becoming both more common and more complex for non-PC devices...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

IT Skill and Salary Trends 2011

October 16, 2011 Added by:Bill Gerneglia

The demand for certain IT skills come and go with the economy. Certain skills are always in demand and others to a lesser degree. As an IT worker are you earning what you are worth? As an IT manager are you paying too much or too little to your IT staff?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Senators Call for Privacy Law Update

October 14, 2011 Added by:Headlines

The Electronic Communications Privacy Act (ECPA) - signed when mobile phones were the size of bricks and the World Wide Web didn't exist – is woefully outdated, putting Americans' privacy at risk. Sens. Wyden and Kirk jointly call for updating U.S. privacy law to keep pace with technology...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Difficulty in Measuring the Performance of Infosec

October 13, 2011 Added by:Rafal Los

In the systems management world, it's about performance, deployment consistency, and uptime - metrics that can be quantified. This pattern repeats for applications and critical systems, and just about every other component of information technology - except, it seems, Information Security...

Comments  (0)

A88973e7d0943d295c99820ab9aeed27

Data Loss Prevention – Technology is Just the Start

October 12, 2011 Added by:Simon Heron

The trouble is that technology is just one element of the solution. There is little doubt that while DLP software and devices can help, there is no single solution that can encompass all aspects of DLP, as different types of data have different threats and hence need different controls...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Anonymous: Conflation, Synergy, Diffusion, and Spin

October 11, 2011 Added by:Infosec Island Admin

Anonymous’ use of technology comes naturally, as they formed online. It is with the growth of connectivity that the movement went viral. Some may say it was the targeting. I say the targeting was always there, but those who were feeling the miasma weren’t able to express it in normal ways...

Comments  (7)

37d5f81e2277051bc17116221040d51c

How the Cloud Will Change Technology

October 11, 2011 Added by:Robert Siciliano

The cloud will encourage the development of identification technologies designed to authenticate individuals online and via mobile. The sheer connectedness facilitated by the cloud and our complimentary devices will ultimately allow for a more seamless and secure digital life...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »