Items Tagged with "Security"


59d9b46aa00c70238bb89056cfeb96c0

Five Important Fraud Investigation Interview Tips

December 03, 2010 Added by:Thomas Fox

A successful investigation interview isn’t just a question and answer period. Asking good questions is just a small piece of a very big puzzle. To get the most out of your fraud investigation interviews, remember these 5 important steps...

Comments  (0)

959779642e6e758563e80b5d83150a9f

About Compliance and Security

December 02, 2010 Added by:Danny Lieberman

If you’re an IT vendor, there may be gold in them thar hills. But when you’re running your business, don’t leave your ethics at home and don’t wait for government to tell you what you learned from your parents at age 5 – always put your toys away, and don’t steal from the other kids...

Comments  (0)

37d5f81e2277051bc17116221040d51c

What Security Issues Should You Worry About?

December 02, 2010 Added by:Robert Siciliano

For many of the issues we worry about the chances of them happening might be 1 in a 100,000 or 1 in 10 million. Your chances of something bad happening may equate to the same statistics as winning the lottery, which is very slim, but you still might play the number...

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

Five Infosec Trends For Which I’m Thankful This Year

December 01, 2010 Added by:Robb Reck

While security is a discipline that might lead people to become introverted and closed-off, there is a thriving community who shares security ideas, engages in productive dialog, and pushes the industry forward...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Leaked Social Security Numbers Put Personal Security at Risk

November 30, 2010 Added by:Robert Siciliano

Every city, state, and town has its own set of regulations determining the collection and management of public records, including birth, death, marriage, court, property, and business filings. Many of these documents include Social Security numbers. And many are posted on the Internet...

Comments  (0)

1f2f664e68a603b3c54890fbbcd37857

WikiLeaks is Doing the Security Profession a Favor

November 29, 2010 Added by:Mark Gardner

What it does highlight though, is the need for pragmatic, effective security controls to be in place, allegedly, these releases were only possibly because the Siprnet database security controls were relaxed to make the system as easy to use as possible...

Comments  (5)

7e6249b5c7f6b63c28587c820b16edcb

Searching for Airline Security Part Deux

November 29, 2010 Added by:Robert Gezelter

TSA has a mission to create a safe environment in the air; at the same time, passengers, flight crew, and airport personnel have a reasonable expectation that their short-term and long-term well-being, physical and psychological, will not be sacrificed in the process...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US and EU Partner on Cyber Wargames and Security Plans

November 24, 2010 Added by:Headlines

The US and EU recently conducted cyber wargames, and have announced plans to cooperate on addressing a range of cyber security issues. The security exercises included participants from the private sector, and were focused on coordinated responses to cyber-related threat scenarios...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Seven Tips for Better Credit Card Security

November 24, 2010 Added by:Robert Siciliano

Every time you use a credit or debit card you increase the chances of that card number being used fraudulently. Cards can be skimmed and hacked in a number of different ways. Whenever you hand your card to a salesperson or waiter, watch where your card is taken and what is done with it...

Comments  (7)

7e6249b5c7f6b63c28587c820b16edcb

Searching for Airline Security

November 22, 2010 Added by:Robert Gezelter

Bruce Schneier has often observed that security theatre can be counterproductive; resources are expended without truly increasing security. Costly scanners that invade privacy while not accomplishing the purpose intended take this discussion to a whole new level...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

Are Security Efforts Decreasing Successful DoD Hacks?

November 22, 2010 Added by:Headlines

Other reports indicate that the frequency of attacks as a whole are on the uptick. Given the weight of the evidence concerning current trends, the most likely explanation is that the decrease is due to a semantic change in the reporting standards used at the DoD as opposed to a decrease in the attacks...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Laptop and Cell Phone Data Searched at Airport

November 22, 2010 Added by:Anthony M. Freed

Your computer and cellphone data can be searched by customs officials. If it is really the case that authorities can act as if our Constitutional rights end at the airport terminal, we have much bigger problems than naked body scans and groping screeners touching our junk...

Comments  (8)

69dafe8b58066478aea48f3d0f384820

People Remain the Number One Threat to Security

November 21, 2010 Added by:Headlines

All the security, training, planning and education in the world can not seem to defend against the human element, and this fact presents the single largest obstacle to security for individuals, enterprise, and government. Here are just a few examples from this week alone...

Comments  (0)

Page « < 16 - 17 - 18 - 19 - 20 > »