Blog Posts Tagged with "Budgets"

4c1c5119b03285e3f64bd83a8f9dfeec

Public Cloud/Private Cloud – A Redux

June 23, 2011 Added by:Ben Kepes

Christian Reilly brings a really interesting perspective to the public/private cloud debate. Reilly sees the daily realities of legacy applications, “just keep the lights on” budgets and multiple issues around compliance and security...

Comments  (0)

9259e8d30306ac2ef4c5dd1936e67634

Calculating the Return on Security Investment (ROSI)

June 20, 2011 Added by:Dejan Kosutic

Traditionally, "making sense" for management means that the revenues that will result from the investment will be larger than the total cost of investment. So what's the problem? The problem is, even if you can calculate the total cost, there are no revenues to be made from security...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Hey CISO, Your Budget is Killing You...

June 14, 2011 Added by:Rafal Los

You've wrestled with justifying initiatives, programs, and security-driven innovation you want to implement to keep the company safe and lower the risk profile, but what you may not know is that the budget you've been working so hard to grow may actually be secretly killing you...

Comments  (0)

9259e8d30306ac2ef4c5dd1936e67634

Return on Security Investment (ROSI) Calculator Launched

June 02, 2011 Added by:Dejan Kosutic

This is the most detailed ROSI Calculator that can be found on the Internet, and it aims to calculate as precisely as possible whether the potential decrease of security incidents (i.e. the risk mitigation) will outweigh the investment in security measures. It's completely free...

Comments  (0)

F520f65cba281c31e29c857faa651872

Open Your Box of IT Innovation

May 28, 2011 Added by:Rahul Neel Mani

Innovation and doing more with less are not just buzzwords. That doesn't mean having Systems up and running can take a back seat either. David Awcock, Head of Technology Standard Chartered Bank, shares his ideas in an interview with Minu Sirsalewala Agarwal, on how he manages both...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Post-Production Application Security Testing

May 17, 2011 Added by:Rafal Los

I've spent several meetings in the last few months reminding people that even though they perform security testing and validation of their apps before they deploy they're leaving those apps running, in some cases for years, without looking back in on them. This is a bad thing...

Comments  (0)

972cda1e62b72640cb7ac702714a115f

NPV and ROSI Part II: Accounting for Uncertainty in the ARO

May 11, 2011 Added by:Kurt Aubuchon

Running the simulation for multiple ARO (Annualized Rate of Occurrence), you find the ARO at which the model begins to produce a positive ROSI in a majority of the simulations. You can determine how frequently a breach has to happen before a security investment makes sense...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

White House Official: Attacks are Risk of Doing Business

April 28, 2011 Added by:Headlines

In the wake of several substantial consumer information breaches such as those at Sony and Epsilon, White House cybersecurity coordinator Howard Schmidt sought to downplay the level of concern in stating that cybersecurity events are simply a business-side risk like any other...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Data Breach Overload is Killing SSA

April 19, 2011 Added by:Rafal Los

Money and technology alone won't bring us secure software or applications. Many times the idea of spending a large chunk of money on tools alone sounds appealing because someone selling you something says that you should - but I'd like to urge caution...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Software Security Assurance in a "One Man Show"

April 15, 2011 Added by:Rafal Los

Down-scaling an enterprise security challenge into a smaller fit is more of a challenge than you'd think, because it's just too easy to say 'outsource it all'... but how does that actually help an organization write more secure software? The answer is that it doesn't...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS Concerned About Cyber Security Budget Cuts

April 14, 2011 Added by:Headlines

"I don't want to tell you that the sky is falling... But I'm telling you that the threat environment is significant, and it is not possible for anyone to stay completely secure. It's just too hard, even for the most concerned agencies or private-sector entities..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Government Shutdown Could Impact Cyber Security

April 07, 2011 Added by:Headlines

"When we put ourselves in state of chaos like this, and this is what it will be, think of the opportunities for striking through the APTs (advanced persistent threats), they can pick and choose the targets with much less security behind them..."

Comments  (1)

959779642e6e758563e80b5d83150a9f

How to Make Federal Data Security Effective

April 06, 2011 Added by:Danny Lieberman

In order to improve IT security countermeasure effectiveness in the Federal Government, the OMB should reduce base payments to contractors who provide IT security services and link their compensation to a reduction in the damage caused to government data and network assets...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Commodity Clouds for Enterprise: Inside the Economics

April 05, 2011 Added by:Ben Kepes

Unfortunately, in the light of what can only be called FUD on the part of more traditional vendors, it is natural that those building clouds in the most efficient (read cheapest) of ways, fight back against some of that spin...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

K-12 Schools Hit by Multiple Security Events Yearly

March 23, 2011 Added by:Headlines

Forty-five percent of K-12 schools suffered network downtime from malware outbreaks between two and five times per year, while another thirteen percent are impacted between six and ten times per year, and six percent experience more than ten incidents in the same period...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Compromises, Budgets and Nonsense

March 17, 2011 Added by:Rafal Los

There is no amount you can spend right now that can make anything better. Software Security Assurance programs, even bare-bones application security testing-only efforts take months to surgically insert into an organization. Generally, money isn't the only part of the equation that's missing...

Comments  (2)

Page « < 3 - 4 - 5 - 6 - 7 > »