Blog Posts Tagged with "IT Security"

Ee5f058b283cdc6dba84464d453801d7

Decrypting the Gender Imbalance: Hiring Women in Cybersecurity

December 09, 2016 Added by:Michelle Johnson Cobb

Organizations that seek to achieve greater representation of women in their IT security teams should maintain a steady, multi-faceted approach to recruitment — and continually evaluate their performance in terms of the advancement and retention of women in this area.

Comments  (0)

Ec47f9657c90a6db70e5e4f1cd1f7a02

The Struggle to Secure the New IT

June 16, 2014 Added by:Gretchen Hellman

Securing the New IT can seem daunting. However, by broadening your skillsets and seeking to have impactful conversations with business executives on the importance of security strategies and investments, it doesn’t have to be.

Comments  (0)

C4080c49428ff549dad480c049cf594b

Does Auditing Have a Role in Your Security Strategy?

March 11, 2014 Added by:Michael Fimin

In order to figure out where auditing should play a part in your security strategy, let’s start by defining what should be audited as part of a security plan. To do this, look first at how security is implemented in its most simple form and work backwards to auditing’s role in your strategy.

Comments  (2)

0a8cae998f9c51e3b3c0ccbaddf521aa

A Renaissance in the Manufacturing and Industrial Sectors

October 24, 2013 Added by:Rafal Los

After what appears to be decades of systematically ignoring security challenges, the recent climate of breaches seems to have shaken something loose. Purse strings have loosened. Boards have begun to ask security questions when they have never done so before. And most of all, I'm seeing several organizations formally hiring CISOs and giving them both accountability and control over the security fu...

Comments  (0)

1de705dde1cf97450678321cd77853d9

The Search for Infosec Minds

November 01, 2012 Added by:Ian Tibble

Since the early 2000s, I have commented in different forms on the state of play, with a large degree of cynicism, which was greeted with cold reservation, smirks, grunts, and various other types of un-voiced displeasure, up to around 2009 or so. But since at least 2010, how things have changed...

Comments  (0)

942a200514c2a9d79858ce6355c40614

Admin Rights - Your Achilles Heel

October 31, 2012 Added by:Paul Kenyon

Every organization experiences user frustrations and complications that result in support calls to the help desk. While each call may seem to suggest a unique problem, there could be a common root cause amongst them. Help desk calls often seem to be black and white – the machine works and now it doesn’t...

Comments  (0)

C67c179cd59e50f867e06086f5b2d21f

The Security Reality of Road Warriors

October 28, 2012 Added by:Barrie Hadfield

Marketing and sales professionals will, inevitability, require a cloud-based collaboration processes or they face a potential competitive disadvantage. Therefore, IT executives are best-served by investigating the rate at which their employees are using unsanctioned tools that facilitate potential breaches...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

On the Lack of IT Readiness: The Security Edition

September 30, 2012 Added by:Rafal Los

Sticking to the basics wouldn't be such a bad thing in Security... if we had a clue on how to do the basics right. I know plenty of people who pentest all day every day and they'll be the first to tell you how easy it is to break in because defenses are so weak, if they exist at all...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Metaphorically Speaking...

September 24, 2012 Added by:Tripwire Inc

Security people tend to be engineering oriented and suffer in the communication department. There’s an implied link that security might get broader adoption if security communication had more resonance with non-security people. Enter the popular use of the metaphor as meme...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Security and the Enterprise: Connect What?

September 20, 2012 Added by:Tripwire Inc

We’re going to use the phrase “Connecting security to the business” with almost annoying frequency because it can change the way the business views security, and vice versa. This begs a primer of sorts: What do we mean by all this “connecting security to the business” talk?

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Enterprise Security: Being Your Own Worst Enemy

August 30, 2012 Added by:Rafal Los

Enterprise security organizations can be their own worst enemies. Security is largely disconnected from the business, largely dependent on technology, and unable to be anything more than a cost center... and it seems like the more we rant and wave our arms the deeper the hole gets...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Your Organizational Chart Tells a Security Story

August 28, 2012 Added by:Tripwire Inc

The common reason to push the security team over to the side or down the org chart is due to a belief that what they do isn’t a core value proposition for the company. By reinforcing the idea that security is low priority it creates impediments for the business and the security team to negotiate risk and work collaboratively...

Comments  (1)

99edc1997453f90eb5ac1430fd9a7c61

On Infosec Friends

August 24, 2012 Added by:Javvad Malik

They are the guys who you look out for and they look out for you. If you see a bug in their code, you’ll sort it out for them. When they call you up at 3am for help with a security strategy presentation, you stay up with them all night working on it. When you are stuck on something, you’ll turn to them for help....

Comments  (5)

0a8cae998f9c51e3b3c0ccbaddf521aa

BYOD: Challenges of Protecting Data - Part Three

August 06, 2012 Added by:Rafal Los

BYOD is going to take the many small holes in your environment and drive a semi truck through them... blowing a hole the size of a Buick in what security we have now. And it's not just because BYOD is going to happen whether you like it or not - but because we need to fix this train wreck we call corporate security...

Comments  (0)

86d8831c7ce6fcda920aac867a984d98

How to Become a Network Security Engineer

July 18, 2012 Added by:InfoSec Institute

While no two jobs are alike, there are some specific skills that will help network security engineers face the various challenges they will face day to day. What follows are just a handful of specific skills and duties required of network security engineers...

Comments  (2)

8e6e3972318ff74b194801340248199e

Infosec: Is it Really OK to Say No?

July 16, 2012 Added by:Scott Thomas

Our job isn't to run the business or set direction, our job is to tell the ones at the helm that building a boat out of tin foil is a bad idea. We need to change the sign on the door from "Department of No" to "How does this affect our risk-posture?" and realize even then sometimes you need to say "No"...

Comments  (3)

Page « < 1 - 2 - 3 - 4 - 5 > »