Enterprise Security


ISAlliance on Defense Industrial Base Cybersecurity

April 21, 2010 Added by:Marjorie Morgan

More information on the ISA's analysis of the economic impact of cybersecurity issues can be found in a new publication from the ISA and the American National Standards Institute (ANSI), The Financial Management of Cyber Risk: An Implementation Framework for CFOs.

Comments  (1)


Cold War Holds Lessons for Cyber Strategy

April 21, 2010 Added by:Richard Stiennon

Perhaps in response to rather vocal criticism of his frantic warnings about cyberwar, Mike McConnell, retired Navy Admiral and  one time Director of National Intelligence, published a position piece in The Washington Post. He draws on the Cold War to support his thesis that the US must do more to counter cyber threats.  Here is my take on his comments.

Comments  (0)


5 Tips to Strengthen Network Security with Limited Budgets

April 16, 2010 Added by:Ray Tan

Nowadays, IT departments are trying to find out ways to strength their network security with limited budgets. Especially small companies, which have even less budget on network security. It is more important for them to know some tips on how to strength their network security with limited budgets. I would like to share you the top 5 tips offered by Jon-Louis Heimerl.

Comments  (4)


An Interview with U.N. Cybersecurity Expert Raoul Chiesa

April 15, 2010 Added by:Anthony M. Freed

I recently had the pleasure of talking with Raoul Chiesa, OPST, OPSA, and ISECOM Trainer, about international perspectives on cybersecurity issues. Mr. Chiesa is a Senior Advisor on Strategic Alliances & Cybercrime Issues at the Global Crimes Unit for the United Nations Interregional Crime & Justice Research Institute, a Member of the Permanent Stakeholders Group at the European Network &a...

Comments  (0)


FaaS: Fraud as a Service

April 14, 2010 Added by:Mike Meikle

In working with various clients on the topic of security, a common theme has emerged. Management and employees still labor under the perception that fraud is still the purview of unorganized individuals with an axe to grind against a specific company. 

Comments  (0)


Internet Security Alliance Comments on IT Cybersecurity

April 13, 2010 Added by:Marjorie Morgan

We must mitigate the ever-increasing abilities of today's cyber criminals to penetrate the current information security barriers, fire walls, etc. of industry and government organizations in order to gain access to the most sensitive and confidential private information stored in its databases.

Comments  (0)


eBay: a hacker's source for acquiring remote monitoring medical devices for security testing?

April 13, 2010 Added by:shawn merdinger

I typically check eBay weekly for medical devices showing up, with an eye for anything with a network interface. Bluetooth-enabled devices abound, but the (mis-perception) that an attacker must be physically close decreases popular interest from a security testing perspective. In contrast, it's a box "on the wire" that enables an attacker in say, Palau, to to reach out and provide what I...

Comments  (1)


The Delivery of Customer’s Electronic Financial Statements using Enterprise Rights Management.

April 13, 2010 Added by:Peter Abatan

Post has been and is quickly becoming an increasing challenge for many organisations of all sizes. Apart from the security issues of financial data getting lost before delivery, spiralling costs of running mailing centres, postal strikes and the increasing cost of postage, businesses and organisations want to embrace technology as an alternative to using post

Comments  (1)


I'm not OK - And Why You Should Care

April 10, 2010 Added by:Steven Fox, CISSP, QSA

The SOW just came through on a new client.  You do some research and find that they just cut their staff by 20% – and you are the lucky security professional that gets to do their PCI compliance review!  You file this in the back of your mind as an environmental factor and proceed to prepare for the engagement.  After all, what matters here is the review, right?

Comments  (0)


A perspective on the theft of confidential documents by former employee at Ford.

April 09, 2010 Added by:Peter Abatan

When I read that a former Ford product engineer had stolen over 4000 confidential documents containing trade secrets from his former employer, I began to wonder how many companies out there are as vulnerable to the same degree as Ford. Fortunately for Ford this employee got caught, but it remains unknown how many employees have successfully got away without Ford’s knowledge?

Comments  (6)


How Does Your Organisation’s Executives Communicate Confidential Information?

April 08, 2010 Added by:Peter Abatan

Trade secrets, executive orders, press briefs, corporate strategies and tactics are all confidential communication tools that could impact the shareholder value of a business. If a press brief is released earlier than is should be, it could cause the net worth of the business to fall. Likewise if an executive communication that is meant for internal use only is released into the public d...

Comments  (0)


AntiMistake Software – Preventing Human Error and Lack of Awareness

April 07, 2010 Added by:Katie Weaver-Johnson

Successful organizations realize antivirus software must be installed on all PCs.  Antivirus software works well if updates are automatic and ongoing (as new risks and threats are identified) to prevent expensive damages to PCs, information and reputations. 

Comments  (1)


Data Security - It's a responsibility, not an option...

April 07, 2010 Added by:Ian Barrs

"We need to talk about security, it's becoming an issue." This is a line that would draw a blank on many a CEOs face, even today. "We've got strong password policies, and no-one's allowed to use USBs", the CEO may burble. If that's your last line of defence, and you merely trust people to follow the rules, you're heading for trouble.

Comments  (0)


Quandary of Social Media Security

April 05, 2010 Added by:Mike Meikle

I was recently asked a question regarding the top IT concerns for social media (Web 2.0) implementation plan. Well, in my view information security is at the top.

Comments  (0)


Why bother with PGP ...???

April 04, 2010 Added by:K S Abhiraj

The very nature of email communication makes it perfect for spying and tapping. Imagine all the emails that fly across the Atlantic Ocean. Every single one of them could be tapped without you even noticing it. Of course, thinking that someone will sit and read every single one of them is preposterous - but the "problem" is that nobody has to.

Comments  (12)


The Biggest Risk to Security Might Be You...

April 04, 2010 Added by:Theresa Payton

Everyone asks me what the greatest theat to security is. They are visibly disappointed when I give them my answer...I believe it is you or maybe your co-worker.

Comments  (7)

Page « < 76 - 77 - 78 - 79 - 80 > »