June 05, 2014 Added by:Patrick Oliver Graf
In the not-so-distant past, when enterprises lacked ubiquitous high-speed Internet connections and the means to provide employees with remote access, organizations were far more likely to enforce strict working hours than they are today. After all, work wouldn't get done if employees weren't present.
June 04, 2014 Added by:Joe Weiss
When people complain that operators are too focused on safety and reliability I don’t know whether to laugh or cry.
June 04, 2014 Added by:Stefano Mele
The U.S. Government Accountability Office (GAO) found that twenty-four major federal agencies did not consistently demonstrate that they are effectively responding to cyber incidents (a security breach of a computerized system and information).
June 02, 2014 Added by:Tripwire Inc
Executive leadership (including the board member) is not typically interested in operational security details such as answers to questions about specific security control metrics. This information is too detailed and will be viewed as “noise” by those outside the IT and security teams.
May 27, 2014 Added by:Tripwire Inc
So the question for us, security professionals and dabblers alike, is how do we make this moment one that makes a difference?
May 22, 2014 Added by:Rebecca Herold
Existing privacy laws address only a fraction of the privacy risks that exist, and new risks are emerging all the time. Don’t put your customers, and innocent children’s, privacy at risk by doing things that may be legal, but still a very bad privacy action.
May 15, 2014 Added by:Sonali Shah
“The King is dead, long live the King” speaks to the inevitability of succession. It is now not a stretch to think about the inevitability of future CEOs leaving power and ascending to power as a result of cyber breaches.
May 13, 2014 Added by:Tripwire Inc
What do we mean when we talk about “hardening systems” to repel exploits and withstand intrusions? Much of this is captured in three simple concepts.
May 06, 2014 Added by:Joe Weiss
DOE recently issued their revised report on Cyber security procurement Language for Energy Delivery Systems dated April 2014.
May 05, 2014 Added by:Electronic Frontier Foundation
Last week, the White House released its report on big data and its privacy implications, the result of a 90-day study commissioned by President Obama during his January 17 speech on NSA surveillance reforms.
Bridging the Cybersecurity Divide, Why Secur... leijon 19 on 02-28-2015
Seven “Sins” of Cyber Security... Andrew David on 02-28-2015
Today's Mobile Device Data Protection Must G... leijon 19 on 02-28-2015