Enterprise Security

49afa3a1bba5280af6c4bf2fb5ea7669

RSA March 2010 Intelligence Report

April 02, 2010 Added by:Mike Meikle

I’ve been ramping up with client projects over the last month so I haven’t been schedule some serious writing time. Excuses aside, I’m being lame it seems.  However, the latest RSA Intelligence Report has crossed my virtual desk, and I’m posting it for good measure

Comments  (0)

E973b16363b3de77b360563237df7e32

Mitigating Risks of the IT Disaster Recovery Test

March 31, 2010 Added by:Bozidar Spirovski

The IT Disaster Recovery Test as part of the Business Continuity testing is becoming an annual event for most IT departments. It is mandated by a lot of regulators, nearly insisted upon by internal audit and ofcourse a very healthy thing to do.

Comments  (0)

6d117b57d55f63febe392e40a478011f

ISAlliance/ANSI Report: The Financial Management of Cyber Risk

March 30, 2010 Added by:Anthony M. Freed

According to the White House Cyberspace Policy Review (CSPR), between 2008 and 2009 American business losses due to cyber attacks had grown to more than $1 trillion of intellectual property - a staggering figure that impacts not only American business, but also our national security, which is dependent upon a robust and secure information infrastructure.

Comments  (0)

959779642e6e758563e80b5d83150a9f

Changing Your Security Requires Learning about Change

March 30, 2010 Added by:Danny Lieberman

Reading through the trade press, DLP vendor marketing collateral and various forums on information security,  the conventional wisdom is that the key threat to an organization is trusted insiders.

Comments  (0)

F520f65cba281c31e29c857faa651872

An Interview with Symantec CEO Enrique Salem

March 29, 2010 Added by:Rahul Neel Mani

Enrique Salem, President and CEO of Symantec, in a conversation with Vinita Gupta, discusses the new challenges that CIOs are facing and Symantec's roadmap for the years ahead.

Comments  (0)

6d117b57d55f63febe392e40a478011f

On The State of Global Information Security

March 28, 2010 Added by:Anthony M. Freed

Simply stated, the state of global information security efforts is dismal.  Cybercrime, fraud, corporate espionage, and threats to critical infrastructure are escalating at a record pace, and we can all count on the fact that things are certain to become much worse over this decade.

Comments  (5)

959779642e6e758563e80b5d83150a9f

The Tao of GRC for CISOs and CSOs

March 25, 2010 Added by:Danny Lieberman

The GRC (governance, risk and compliance) market is driven by three factors: government regulation such as Sarbanes-Oxley, industry compliance such as PCI DSS 1.2 and growing numbers of data security breaches and Internet acceptable usage violations in the workplace. $14BN a year is spent in the US alone on corporate-governance-related IT spending . 

Comments  (2)

F338ee966b0240a58cc1dbf24855dd26

Cyber Crime & Terrorism Take a Dangerous Turn

March 24, 2010 Added by:Jenni Hesterman

Most would agree that globalization, fed by technological advances in the information system and telecommunications realms, has overwhelmingly been a "good thing". Our world is connected like never before, and those formerly isolated are now part of the landscape, able to access critical medical information, tap educational resources and answer almost any question in two clicks.

Comments  (4)

6d117b57d55f63febe392e40a478011f

Interview with Former White House CIO Theresa Payton

March 23, 2010 Added by:Anthony M. Freed

I recently had the pleasure of making the acquaintance of the illustrious Theresa Payton, who's long and vibrant career has spanned multiple industry sectors and government service at the highest levels.

Comments  (4)

B3f8f23c67988f1d4f507a11b1442cc0

Clash of Security and Social Network Marketing

March 16, 2010 Added by:Crystal Craven

Information Security Gurus and Marketing Professionals are often at odds with each other in the business realm. Marketing used to primarily be a print and face to face business function. Thanks to the over-haul of standard marketing strategies, marketing has grown new roots on the web and has found itself buried deep within social networking sites like LinkedIn, Facebook and Twitter.

Comments  (9)

38829f9c58dc699a3ef4caf9edf69b9a

Executive Series Tech Tip - Inadequate Vulnerability Assessment

March 16, 2010 Added by:Michael Bruck

Your latest Vulnerability Assessment is likely a waste of your IT Budget dollars!  Why? 

Comments  (5)

00fd6160b9db2d91e663a578d87cbaf3

Vigilantes or Public Servants?

March 15, 2010 Added by:Wayde York

No one likes SPAM (the email variety.) Every responsible user of the Internet and surely every responsible information security professional would agree that anti-spam efforts are needed and likely should be expanded. What happens, however, when the Internet-based anti-spam agents become a hindrance to business?

Comments  (3)

E4b33dbe234685965beb3e9f2a0ad456

Need to consolidate information security compliance efforts? Try open source.

March 12, 2010 Added by:Ted LeRoy

Many organizations have to comply with multiple regulatory requirements for their information security infrastructures.  Fragmented efforts to comply Sarbanes-Oxley (sarbox or SOX), Gramm Leach Bliley Act (GLBA), Health Insurance Portability and Accountability Act (HIPAA),  Payment Card Industry - Data Security Standard (PCI-DSS), and ISO 27000 series, to name a few, can result in c...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Hacker Releases Second Video of Enhanced XerXeS DoS Attack on Apache Vulnerability

March 11, 2010 Added by:Anthony M. Freed

Infosec Island has once again gained exclusive access to a video demonstration of the XerXeS DoS. This new video shows a little more of the XerXeS dashboard, and reveals even more about the attack technique – watch the text box on the left as Jester mentions “Apache” for the first time outside of our private conversations.

Comments  (15)

2ae549cf604c064a34019c7bd4a81e24

Newbie Introduction to Digital Forensics Part 2

March 08, 2010 Added by:Juan Granados

The information available on the internet can be a blessing and a curse at the same time. The multitude of information can be overwhelming for the newly annointed "Padawan" learner. One thing was clear....Forensic analysis was an art rather than a science. My hope of finding a "Cliff's Notes" version of "Digital Forensics" would prove to be impossible.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Simple Log Review Checklist Released!

March 08, 2010 Added by:Anton Chuvakin

Today, many people are looking for very simple solutions to big and complex problems – and the area of logging and log management is no exception. Following that theme, we have created a "Critical Log Review Checklist for Security Incidents" which is released to the world today.

Comments  (1)

Page « < 76 - 77 - 78 - 79 - 80 > »