Blog Posts Tagged with "breaches"
June 22, 2011 Added by:Robb Reck
We bring in these third party vendors because we trust that they have all the experience and knowledge with a given security product. But they are missing a critical piece: Experience with our systems. No technology solution is complete and ideal for every environment out of the box...
June 21, 2011 Added by:Alexander Rothacker
It’s incumbent on the individuals that are responsible for the security of the data to ride this wave of activity, raise awareness, and move their security projects forward. There is no reason these large breaches should be occurring, not when the solutions already exist...
June 21, 2011 Added by:Danny Lieberman
The ethical behavior for protecting company assets starts with company executives who show from personal example that IT infrastructure is to be used to further the company’s business and improving customer service and not for personal entertainment, gain or gratification...
June 14, 2011 Added by:Headlines
“You shouldn’t have to cross your fingers and whisper a prayer when you type in a credit card number on your computer and hit ‘enter.’ E-commerce is a vital and growing part of our economy. We should take steps to embrace and protect it – and that starts with robust cyber security..."
June 10, 2011 Added by:Bill Gerneglia
It is difficult to remain 100% confident in your organizations security policies and procedures, but we must remain 100% committed to diligence in constant upgrades and feedback from attempted breaches to our networks and systems...
June 09, 2011 Added by:Headlines
“With hundreds of data loss incidents every year – both reported and unreported – it’s no surprise the issues with governance, risk and compliance are being magnified. Data security in a modern day world means more than deploying a set of technologies to overcome these challenges..."
June 09, 2011 Added by:Andrew Baker
The issue of disclosure is a sensitive one, and it is important not to feed more bad guys with more information that will allow them to have greater success, but it is abundantly clear that two months of saying essentially nothing is at least just as bad as saying too much, if not worse...
June 06, 2011 Added by:Rafal Los
If you've been in Information Security for any meaningful period of time you can surely side with the frustration and disappointment many of the long-time residents of Infosec-ville are feeling as breach after breach piles on in the news. The result of all of this is a downward spiral...
June 05, 2011 Added by:Kelly Colgan
Recovering successfully from a breach is definitely something to shoot for. But nothing makes executives smile, or helps build back customer confidence, more then putting the bad guys behind bars. It makes for good news headlines. Plan for it...
May 31, 2011 Added by:Kelly Colgan
The proposed bill is nothing more than an outdated, bandwagon approach that creates more red tape for businesses, weakens state law, and overprotects small- to medium-sized companies that suffer data breaches. Bottom line: It offers little, meaningful help to the consumer...
May 24, 2011 Added by:Headlines
Report: "A significant number of IT staff could cause chaos for their organizations with their knowledge of and access to digital certificates and encryption keys due to lack of management controls and no separation of duties..."
May 23, 2011 Added by:Headlines
"It is nearly impossible to run a totally secure Web presence, especially when you are the size of Sony. As long as it is popular within the hacker community to expose Sony's flaws, we are likely to continue seeing successful attacks against them..."
May 19, 2011 Added by:David Navetta
A majority of cloud computing providers surveyed do not believe their organization views security as a competitive advantage. Further, they do not consider security as an important responsibility and do not believe they adequately secure the confidential information of their customers...
May 17, 2011 Added by:Robert Siciliano
At 2010’s Defcon, a game was played in which contestants used the telephone to convince company employees to voluntarily cough up information they probably shouldn’t have. Of 135 “targets” of the social engineering “game,” 130 blurted out sensitive information...
May 16, 2011 Added by:Robert Siciliano
It is important to observe basic security precautions to protect your identity. However, the safety of your information with corporations and other entities that you transact business with is very often beyond your control...
May 15, 2011 Added by:Kelly Colgan
Governments, like many big businesses, have robust security programs, a layered cyberdefense plan. It’s nice to have all the tech tools at hand to prevent a breach, but they don’t amount to much if no one knows how to extract intelligence from them...
Steps Toward Weaponizing the Android Platfor... Freid Jerome on 05-17-2013