Blog Posts Tagged with "IT Security"


NIST Draft Guidance for Monitoring IT System Security

January 26, 2012 Added by:Headlines

Three new draft reports published by the NIST are designed to help both public and private organizations improve the security of their information management systems by developing capabilities for continuous monitoring of security...

Comments  (0)


Social Business Security and Risk Management Strategies

January 18, 2012 Added by:Andrea Zapparoli Manzoni

This is not something that the Marketing Department can handle alone, nor IT, not even the Security Team the Legal Department: all will fail if given the task of managing an organization's Social Business Strategy outside a multidisciplinary and truly integrated approach...

Comments  (0)


Is Healthcare IT Security on Life Support?

January 13, 2012 Added by:Rafal Los

As costs pile up from beaches, innovation suffers. Ask someone who runs a hospital network - the true cost of innovation slow-down can be counted in lives. Maybe I'm being a little dramatic, but I suspect this is closer to reality than we'd like to admit to ourselves...

Comments  (0)


Why Do We Pen Test?

January 13, 2012 Added by:Robb Reck

When we get deep into the weeds of any pentest, the results are not going to be pretty. Some systems don’t get patched like they should. Some servers get stood up outside proper change controls. These types of exceptions cause pentest findings and look bad. They are gotchas...

Comments  (0)


IT Trends for 2011 and Beyond

December 25, 2011 Added by:Bill Gerneglia

CIOs and senior IT business decision makers must maintain a focus on specific trends that will effect the industries in which they compete. You should already be thinking about how technology is going to help shape your business far into the future. CIOs have to be forward-thinking...

Comments  (0)


Modern Encryption – So Easy a Caveman Could Do It

December 19, 2011 Added by:Kanguru Solutions

Adding encryption is a relatively easy and cost effective way to secure your organizations data without adding significant cost or complexity. For organizations dealing with confidential information (healthcare, banking, government) it should be mandatory...

Comments  (0)


Plagiarism in IT Security - Walking a Fine Line

December 09, 2011 Added by:Rafal Los

At the end of the day, shouldn't we all be professionals? I know it's nice to think that everyone is honest - but as the infosec world expands and there is a massive influx of people trying to make a name for themselves - there will be dishonesty. This is where the community comes in...

Comments  (2)


Human Security is Weaker than IT Security

December 06, 2011 Added by:Robert Siciliano

Information technologies have evolved to a level at which the developers, programmers, and security specialists all know what they’re doing, and are able to produce products and services that work and are reasonably secure. Of course, there’s always room for improvement...

Comments  (0)


Infosec: Homer Simpson or George Washington?

November 28, 2011 Added by:Ali-Reza Anghaie

Consider three fields when pondering infosec strategies: Defense, Economics, and Healthcare. All three have grasped nonlinear preventative and swarm tactics in a way we would be wise to consider. And like infosec, all three also have snake oil salesmen and demons to satiate...

Comments  (1)


Enterprise Information Security is About Progress

November 20, 2011 Added by:Robb Reck

Enterprise security is a service function. We exist to enable the business to do their jobs without being crippled by attacks and unreliable systems or losing trade-secrets to competitors. As soon as we stop enabling the business to produce better and faster, we become a liability...

Comments  (0)


Consumers Need to Rethink IT Security and Safety

November 16, 2011 Added by:Robert Siciliano

The threat of lost or stolen devices and the possibility of their personal information being used for fraudulent means a significant concern. In the United States 113 mobile phones are lost every minute and more than half of smartphone users do not use any password protection...

Comments  (0)


The Fine Line Between Software Defects and Features

November 09, 2011 Added by:Rafal Los

When we find a bug in software that has the potential for causing security-related issues, we want to convince the business to fix the issue, remediate the problem that we find. Only thing is, while we see it as a security vulnerability the business sees it as a critical feature...

Comments  (1)


Effective Software Security Starts and Ends with Requirements

October 28, 2011 Added by:Rafal Los

Threat modeling software is a delicate art, and often mis-understood enough to cause poor execution. It seems elementary that the best time to impact security in a positive way is during requirements gathering, yet many security professionals continue to ignore that opportunity...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »