Blog Posts Tagged with "Enterprise Security"

E745f78c8d9499cf7e9aea2084be2e0a

Focus on the Host

December 06, 2012 Added by:Matthew McWhirt

The traditional concept of enterprise security monitoring typically encompasses observing and mitigating threats at the perimeter of the organization. While there is still a necessity for this model of security monitoring, the true notion of enterprise continuous monitoring practices must include a focus on the host...

Comments  (0)

Ff632049ba1218ecd55b8122b2112642

Risky Business

December 03, 2012 Added by:Randall Frietzsche

In the broad spectrum of activities which might be called Information Security, we must always first and foremost implement, execute and follow through with risk management. Risk management is the backbone or foundation of any good information security program...

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Fifteen Tips to Improve Your Infosec Risk Management Practice

November 29, 2012 Added by:Tripwire Inc

For years security vendors have been able to play off the general fears of malware and cyber attacks. As the scope of protecting data has become more complex, we’ve slowly learned that deploying more security controls alone is not a risk management solution...

Comments  (0)

145dfdfe39f987b240313956a81652d1

Pen Test vs. Vulnerability Scan: You know the difference, but do they?

November 28, 2012 Added by:Stacey Holleran

Small business owners often don't have someone who is versed in network security. So when they are told they need a “network penetration test” to comply with PCI DSS, many will contact the growing number of companies offering inexpensive testing services...

Comments  (5)

59d9b46aa00c70238bb89056cfeb96c0

Beacon Events Compliance Conference in Beijing – I Wish I Could Be There

November 27, 2012 Added by:Thomas Fox

If you have not had the opportunity to attend a compliance-related conference tailored to the challenges of working in the Far East this would be the one for you. Even if you have attended such an event, this conference focuses on China and will give you insight into how to do business...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

On Terms of Service, and a Global Code

November 25, 2012 Added by:Ben Kepes

TOS;DR aims to help with what is possibly the biggest lie on the internet, that which users make when they click that they have read, understood and accepted the terms of service of their provider. The fact is that no one reads them but rather vaguely hopes for the best...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Why You Should Care About Mobile Security: An Infographic

November 24, 2012 Added by:Fergal Glynn

No matter what you believe, you need to understand the security threats that come along with BYOD and how to best protect yourself and your business against them. Join Joe Worker and Joe IT as we walk you through the basics of BYOD and mobile security...

Comments  (1)

C787d4daae33f0e155e00c614f07b0ee

Resource Scarcity in Information Security - Part 2

November 19, 2012 Added by:Robb Reck

In our last post we discussed how to deal with resource scarcity and why the only effective strategy involves reducing the team’s scope. In this post I will dive into how we can reduce the information security team’s scope of work while preserving the value delivered to the business to the greatest extent possible...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Security ROI "Death Spiral"

November 18, 2012 Added by:Rafal Los

The worst thing that can happen to a CISO is to get trapped in the ROI Death Spiral. I know, I know, we’ve all been told that we need to justify cost, manage expense, use the tools our companies provide us, etc. CISOs that don’t play by the rules won’t get anywhere...

Comments  (0)

888605c6c25c19e41bbbb986ea6d43c1

You Believe It Because "I" Wrote It

November 14, 2012 Added by:Jim Palazzolo

Besides sheer entertainment, my objective is to practice my ability to create deception. It has been my observation that security personnel must be able to spot deception. Whether it’s covert channels or fake ID’s, deception is a very powerful tool that can be used both offensively and defensive...

Comments  (0)

E6fba550184963cb20ac46502a1fa1ee

I lost my theory of mind… or Where my mind at?

November 13, 2012 Added by:Will Tarkington

Without the theory of mind everything that social engineers do or attempt to do would fail. The theory of mind is basically one’s ability to differentiate perspectives. From perspective comes intention, from intention comes reaction, and from reaction comes reward (or failure)...

Comments  (1)

5a8300df8aa4169096932e433ec884b5

BYOD savings may be lost by security and admin costs

November 12, 2012 Added by:Rainer Enders

Companies need to mobilize, that is without question -- but for too long BYOD has become nearly synonymous with this effort. In reality, BYOD is just one of the ways enterprises can mobilize, and in many cases, it is not the most secure, or necessarily the most cost-efficient way to do so...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Security and Privacy Concerns for Mobile Devices

November 11, 2012 Added by:Dan Dieterle

BYOD (Bring your own Device) is one of the latest tech fads. Bring in that tablet or smart phone from home and we will hook it right up to our corporate network for you! What a great thing, and the IT staff just loves it too. But there are some serious concerns about mobile devices...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

BYOD Costs are Rising

November 11, 2012 Added by:Bill Gerneglia

Recent research demonstrates some of the quantifiable benefits and complexities associated with allowing employees to use their own mobile devices on their employers' networks. Most organizations are now enabling BYOD in the enterprise...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Buzzword Compliance Not Enough: Must Haves for Meaningful Use

November 08, 2012 Added by:Danny Lieberman

Many technology vendors tout the idea of self management, and the advantages of mobile healthcare apps, virtual visits, tablets and e-detailing but in fact, a face-to-face relationship with a doctor is more powerful than a digital relationship alone. We don’t need Sherry Turkle to tell us that...

Comments  (0)

1b061b1cec6b5898e5326992d9461610

Infosec’s Most Dangerous Game: Groupthink

November 07, 2012 Added by:Dave Shackleford

These days, I am very, very afraid for the future of CISOs. Over the past few years, and specifically the past 12 months, I have become increasingly alarmed at the level of “groupthink” and “synchronized nodding” going on with security executives. Here are some of the things I am seeing...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »