Latest Blog Posts

Ee445365f5f87ac6a6017afd9411a04a

What is Continuous Compliance and Assurance?

June 18, 2014 Added by:Jon Long

The phrase "Continuous Compliance" is almost meaningless without an additional reference of "Assurance." I define continuous compliance and assurance as an ongoing process of proactive risk management that delivers predictable, transparent, and cost-effective results to meet information security goals.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

3 Tips for BYOD

June 18, 2014 Added by:Brent Huston

While much has been said about products and services that are emerging around this space, I wanted to tack back to 3 quick basics that can really help, especially in small and mid-size organizations.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

Prank URL Shortening Service is Good Security Basics Reminder

June 18, 2014 Added by:Malwarebytes

Of course, it pays to be vigilant when presented with a shortening service link. While it’s a useful tool to have, there have always been issues with regards to your possible final destination.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Operationalizing Cyber Requires Collaboration

June 17, 2014 Added by:InfosecIsland News

Military, government and commercial leaders will discuss national security in cyberspace at AFCEA International Cyber Symposium 2014.

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Physical Security is Still a Problem

June 17, 2014 Added by:Joe Weiss

I did not think we would be able to film directly in front of large electric substations and other critical infrastructures. I was wrong.

Comments  (0)

F5b1211c3952ce30f829cd3c757a1a7f

An Ounce of Big Data is Worth a Pound of Defense

June 17, 2014 Added by:Ali Golshan

In security circles, the concept of what constitutes prevention has shifted from as recently as five years ago, due to the growth in complexity of malware and growing maturity and sophistication of cybercriminals.

Comments  (0)

65be44ae7088566069cc3bef454174a7

Using “Compliant” Stuff Doesn’t Result in Full Compliance

June 16, 2014 Added by:Rebecca Herold

Organizations that access, in any way, some type of personal information will likely have data protection compliance requirements with which they must comply.

Comments  (0)

Ec47f9657c90a6db70e5e4f1cd1f7a02

The Struggle to Secure the New IT

June 16, 2014 Added by:Gretchen Hellman

Securing the New IT can seem daunting. However, by broadening your skillsets and seeking to have impactful conversations with business executives on the importance of security strategies and investments, it doesn’t have to be.

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

An Interview with Johan Hybinette

June 16, 2014 Added by:Robb Reck

Johan has served as the CISO and CTO for Schryver Medical for the past five years, and has just accepted the opportunity to join Hosting.com, located just off I-25, in the old Gates Factory.

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Global Response to Snowden Disclosures Revealed in New Report

June 12, 2014 Added by:Electronic Frontier Foundation

It has been one year since the first Snowden disclosure and in lieu of this first anniversary, world privacy expert and publisher of The Privacy Surgeon, Simon Davies, conceived and published a report titled “A Crisis of Accountability: A global analysis of the impact of the Snowden revelations.”

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

Wide Open “Online Enabled” Physical Security Devices

June 12, 2014 Added by:Dan Dieterle

With the mad rush to make things more user friendly and convenient, security is being left aside, even in devices that are being used to protect facilities!

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

ICSs and the Internet – What is Actually Happening

June 11, 2014 Added by:Joe Weiss

The story is that MANY ICSs are connected to the Internet and it isn’t expensive to find them.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Will Network Security Concerns Sink Government BYOD?

June 11, 2014 Added by:Patrick Oliver Graf

Government BYOD is inevitable – IDC predicts that although currently “personal devices make up just 5 percent of the government market, that figure will grow at double-digit rates for the next three years.”

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Security: It's Us vs. Them - Or is it?

June 10, 2014 Added by:Tripwire Inc

The fact is most reported breaches are not caused by elegant external attacks. They are caused by careless employees who click the link before they think, despite our best efforts to make them aware of risks and train them in security basics.

Comments  (0)

F5b1211c3952ce30f829cd3c757a1a7f

Was Steve Jobs Wrong About Product Design?

June 10, 2014 Added by:Ali Golshan

It is not a question of if we should listen to customers, rather what we should or must listen to customers for, and how we listen.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

SIEM Analytics Histories and Lessons

June 09, 2014 Added by:Anton Chuvakin

I’ve been obsessed with stored/historical data analysis inside a SIEM for a while, long before the current craze about so-called “security analytics” has been inflicted upon the community.

Comments  (0)


« First < Previous | 2 - 3 - 4 - 5 - 6 | Next > Last »