Budgets

Bd07d58f0d31d48d3764821d109bf165

The Five Stages of Vulnerability Management

July 21, 2014 Added by:Tripwire Inc

The key to having a good information security program within your organization is having a good vulnerability management program.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Security: Not Just a Checkbox Anymore

July 15, 2014 Added by:Tripwire Inc

There have been many publicized victims of breaches recently. There can often be a lot of conjecture as to what happened, how it happened, and why it happened.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Why No Security Analytics Market?

July 10, 2014 Added by:Anton Chuvakin

So, occasionally I get this call from somebody (vendor, end-user, investor, etc) inquiring about“the size of the security analytics market.” They are usually shocked at our answer: since there is no such market, there is no size to report.

Comments  (0)

4e9404278ec48b9cce4fcfa8ca048c29

Defense in Depth for Advanced Threat Protection

July 09, 2014 Added by:Alain Mayer

I believe that defense in depth – a long-established information assurance concept – can help in developing a sensible strategy for the evolving threat landscape.

Comments  (0)

Default-avatar

How Enterprises Can Leverage SMS to Minimize Security Risks and Aftermath

July 03, 2014 Added by:Steve French

As a virtually ubiquitous technology enabling automation and reliable two-way communications worldwide, SMS mobile messaging has proven crucial for those enterprises with effective data security, incident management and business continuity measures in place.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

In Defense of Reactive Security

July 01, 2014 Added by:Rafal Los

Every one of us reacts to our environment, it's how we survive. And yet - when you say "reactive" security today you get looks from people like that's a dirty word.

Comments  (0)

6d117b57d55f63febe392e40a478011f

BSidesLV Preview: How to Make Your Security Program Not Suck

July 01, 2014 Added by:Anthony M. Freed

With the August 5th & 6th show fast approaching, we are continuing our series highlighting some of the coolest presentations that are scheduled to take place at Security BSides Las Vegas.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Choosing the Right Entry Point for a Software Security Program

June 30, 2014 Added by:Rafal Los

The topic of software security, or AppSec, has once again cropped up recently in my travels and conversations so I thought it would be prudent to address that here on the blog.

Comments  (0)

65be44ae7088566069cc3bef454174a7

10 Big Data Analytics Privacy Problems

June 30, 2014 Added by:Rebecca Herold

The power of big data analytics is so great that in addition to all the positive business possibilities, there are just as many new privacy concerns being created. Here are ten of the most significant privacy risks.

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Security Essentials? Basics? Fundamentals? Bare Minimum?

June 25, 2014 Added by:Anton Chuvakin

Let’s think together – what technologies and practices constitute information security essentials?

Comments  (0)

B8db824b8b275afb1f4160f03cd3f733

What’s the Best Tool for the Job?

June 24, 2014 Added by:Jack Daniel

I thought back to my favorite patch and systems management tools from past jobs when I ran mixed (but mostly Windows) networks for small businesses. That reminded me of a lesson about tools I learned many years ago.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

3 Tips for BYOD

June 18, 2014 Added by:Brent Huston

While much has been said about products and services that are emerging around this space, I wanted to tack back to 3 quick basics that can really help, especially in small and mid-size organizations.

Comments  (0)

F5b1211c3952ce30f829cd3c757a1a7f

An Ounce of Big Data is Worth a Pound of Defense

June 17, 2014 Added by:Ali Golshan

In security circles, the concept of what constitutes prevention has shifted from as recently as five years ago, due to the growth in complexity of malware and growing maturity and sophistication of cybercriminals.

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Global Response to Snowden Disclosures Revealed in New Report

June 12, 2014 Added by:Electronic Frontier Foundation

It has been one year since the first Snowden disclosure and in lieu of this first anniversary, world privacy expert and publisher of The Privacy Surgeon, Simon Davies, conceived and published a report titled “A Crisis of Accountability: A global analysis of the impact of the Snowden revelations.”

Comments  (1)

E595c1d49bf4a26f8e14ce59812af80e

Will Network Security Concerns Sink Government BYOD?

June 11, 2014 Added by:Patrick Oliver Graf

Government BYOD is inevitable – IDC predicts that although currently “personal devices make up just 5 percent of the government market, that figure will grow at double-digit rates for the next three years.”

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Security: It's Us vs. Them - Or is it?

June 10, 2014 Added by:Tripwire Inc

The fact is most reported breaches are not caused by elegant external attacks. They are caused by careless employees who click the link before they think, despite our best efforts to make them aware of risks and train them in security basics.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »