Blog Posts Tagged with "Risk Mitigation"
May 03, 2012 Added by:Paul Paget
Unless you run a network that has no Internet connection and a “no disks” policy, the only way to against malware is to employ application white listing, which protects the software that controls the behavior of your computers. If the software is not on the white list, it won’t run...
April 26, 2012 Added by:Simon Heron
The security of data in use is about risk mitigation. However, with the current targeted attacks and the proliferation of zero day threats, the risk level is high. It is necessary that action is taken to implement the required precautions that reduce the risk to an acceptable level...
November 22, 2011 Added by:Headlines
"With banks and financial institutions expanding this service to a retail customer base that often undergoes less stringent due diligence than do their commercial customers, is the potential for fraud increasing?"
November 20, 2011 Added by:Robb Reck
Enterprise security is a service function. We exist to enable the business to do their jobs without being crippled by attacks and unreliable systems or losing trade-secrets to competitors. As soon as we stop enabling the business to produce better and faster, we become a liability...
November 15, 2011 Added by:Gabriel Bassett
Engineering is required to provide operations the tools they need. Intel is needed to provide operations information to act. Counter-intel is needed to help operations slow the loss of information. Only when all areas are working in concert for the common operational goal, is security realized...
October 21, 2011 Added by:Kanguru Solutions
Kanguru Solutions has teamed up with Cyber Data Risk Managers LLC to host a FREE webinar on cyber security and infosec entitled “How to Minimize the Risks of a Data Breach/Cyber Attack.” This free webinar will discuss data security, privacy and measures to take in the event of a data breach...
June 13, 2011 Added by:Boris Sverdlik
To implement a data loss solution, you must take a holistic approach to identify the problem, threat vectors and vulnerabilities. You must understand where your sensitive data lives within your organization. This can’t be done with a tool, regardless of how good they claim it is...
February 03, 2011 Added by:Headlines
Translating the jargon laden techno babble of information security into a language the CxO level can understand and find actionable is one of the biggest hurdles the infosec professional faces. In an article by Gary Loveland, the top ten questions CEOs need to ask about security issues are outlined...
Steps Toward Weaponizing the Android Platfor... Freid Jerome on 05-17-2013