Security Training

219bfe49c4e7e1a3760f307bfecb9954

Your Guide to Getting Started with Mobile Application Assessments

December 04, 2013 Added by:Rohit Sethi

My colleague, Andre Harricharran, security consultant with Security Compass, offers a closer look at the mobile application assessment process and requirements, and what organizations should consider when procuring this type of service

Comments  (0)

219bfe49c4e7e1a3760f307bfecb9954

How Do I Measure the Success of a Training Program?

November 19, 2013 Added by:Rohit Sethi

An information security training program is crucial for ensuring and maintaining a good security posture; in order to effectively manage this program you have to be able to measure it. This article introduces a concept recommended by NIST in their Special Publication 800-16, for evaluating training effectiveness.

Comments  (0)

4c8a80b80e239c2dd6cd6f8760e10e5f

The Dimensions of Detecting a Social Crisis

November 18, 2013 Added by:Vince Schiavone

To achieve advance warning of risks and threats, corporations now require social intelligence as the backbone of their crisis management strategy. This is no different than the way military or intelligence organizations operate – knowledge is power and propagates effective response.

Comments  (0)

54b393d8c5ad38d03c46d060fa365773

Security Advisor Alliance, A Nonprofit of Elite CISOs giving back to the community.

November 12, 2013 Added by:Jason Clark

Security Advisor Alliance is a nonprofit group of Top security leaders from the Global 1000 who have come together to donate time each week to help our peers in any area of security as a pro-bono service.

Comments  (0)

219bfe49c4e7e1a3760f307bfecb9954

Security Training Program – Fixed or Customized?

November 07, 2013 Added by:Rohit Sethi

Vishal Asthana, takes a closer look at key questions to ask when implementing a software developer security training program.

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Is Your Business Ready for Cyber Monday?

November 06, 2013 Added by:Allan Pratt, MBA

Cyber Monday is the day when all employers cringe. This is because many employees will spend a portion of their day making online holiday purchases instead of working.

Comments  (0)

4c8a80b80e239c2dd6cd6f8760e10e5f

Social Threats of Greatest Risk Concern for Executives

October 22, 2013 Added by:Vince Schiavone

As the “social age,” “mobile age” and “consumer age” converge, enterprise risk is experiencing a evolutionary shift due to the array of complex emerging threats that are challenging corporations on various levels. With billions upon billions of daily social discussions from consumers, influencers, competitors, activists, journalists and regulators, an entirely new social dimension of r...

Comments  (0)

4c8a80b80e239c2dd6cd6f8760e10e5f

Industry's First Social Risk Guide Released

October 03, 2013 Added by:Vince Schiavone

To help executives understand and address the growing dangers of social risks threatening their revenue and reputation, I assembled a consortium of academic and commercial experts spanning social intelligence, enterprise risk, digital privacy, communications and security to write the industry’s first comprehensive handbook on the topic.

Comments  (2)

219bfe49c4e7e1a3760f307bfecb9954

Why Remediating Assessment Results Might be Harmful to Your Business

September 11, 2013 Added by:Rohit Sethi

Let’s say you’ve just had a pen test or security scan performed on your application. You review the list of findings and get to work on remediation. Apart from obvious shortcomings of any individual single assessment technique, you may also be doing a disservice to meeting your business goals.

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Cyber Security and Terrorism – See Something, Say Something

August 08, 2013 Added by:Jon Stout

he existing cyber security computing model of the past decade, based on firewalls, anti-viral services, intrusion detection controls, etc., is no longer adequate to help organizations mitigate cyber-security risk.

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Cyber Security and Social Engineering – A True Case Study

August 01, 2013 Added by:Jon Stout

There are powerful integrated security dashboards that can be installed and modified to meet each user’s particular needs. Now a company can create hundreds if not thousands of employee cyber warriors with a relatively small investment.

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Cyber Security – Is Offensive Cyber Security Necessary?

July 31, 2013 Added by:Jon Stout

The country is at war and it is a cyber security war. The enemies are many, diverse and competent and fighting a defensive war is not the best way to win. Cyber security war is like any other war- taking the offensive will improve your chances of success. Like any other war, the cyber security war requires proper planning for success and a total winning strategy. Half hearted measures will not ...

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Top Secret SCI Jobs - The Value of Smaller Contractors

July 30, 2013 Added by:Jon Stout

You can be doing all the right things, adding immense value to your customer and helping your company build a great brand. When a contract changes even incumbents are suddenly “on the bench” or “between projects” or “on overhead” . You are no longer billable. As a result you have now moved from a profit-generator to a cost center. When this happens you are at risk.

Comments  (0)

F66c1a87a8db2cb584b4e06e93a84ce3

Unfolding ‘DOUBLE TWINS’ Deception Scheme

July 29, 2013 Added by:Mikko Jakonen

‘DOUBLE TWINS‘ is deception scheme combining modern world speed, easiness to run anonymous with Internet and difficulties with real corporate and personal identity verification. What makes it most interesting; it was ‘quick in – quick out’ – job, completed within 3 weeks from the start.

Comments  (0)

B44a73900ca3197c2d8f148e303b3faa

Contextual-Relevance: A New Paradigm for Information Security.

July 08, 2013 Added by:Brad Bemis

Introducing the term "Contextual-Relevance" into the security lexicon: For information security to function properly, it MUST take into account the unique organizational context that applies in any given situation. This fundamental concept is so crucial to the underlying fabric of a successful security program, that is pervades all aspects of the security function.

Comments  (1)

Ae27d21943468124221937d59167fff8

New Training Model for Advanced Persistent Threat Detection and Mitigation

June 28, 2013 Added by:Edwin Covert

Organizations face a new threat to their information systems and intellectual property: advanced persistent threats, or APT. In order to detect and mitigate these attacks, organizations must develop a cyber-security capability that allows them to defend themselves.

Comments  (0)

Page « < 8 - 9 - 10 - 11 - 12 > »