Blog Posts Tagged with "Budgets"
Is it really important to have a structured security budget? (part1)
April 22, 2010 Added by:Dario Forte
At the time this post is being written, the dynamics of management's understanding of security issues and the valorization of security investments remain somewhat nebulous. Until this concept is fully interpreted and explored, this valorization is assigned to those in the company who deal with information security. And if they are lucky, they are given a reasonable budget to administrate.
Comments (2)
5 Tips to Strengthen Network Security with Limited Budgets
April 16, 2010 Added by:Ray Tan
Nowadays, IT departments are trying to find out ways to strength their network security with limited budgets. Especially small companies, which have even less budget on network security. It is more important for them to know some tips on how to strength their network security with limited budgets. I would like to share you the top 5 tips offered by Jon-Louis Heimerl.
Comments (4)
Need to consolidate information security compliance efforts? Try open source.
March 12, 2010 Added by:Ted LeRoy
Many organizations have to comply with multiple regulatory requirements for their information security infrastructures. Fragmented efforts to comply Sarbanes-Oxley (sarbox or SOX), Gramm Leach Bliley Act (GLBA), Health Insurance Portability and Accountability Act (HIPAA), Payment Card Industry - Data Security Standard (PCI-DSS), and ISO 27000 series, to name a few, can result in c...
Comments (0)
Newbie introduction to digital forensics Part 1.
March 08, 2010 Added by:Juan Granados
The economic and business challenges of the last year have forced changes to business priorities in many areas. For IT, increased scrutiny was placed on data leakage and security. When times are good, businesses can become distracted with new products and technologies. It is not until budgets are cut that the focus moves inward.
Comments (1)
Why Infosec Languishes, Part II
October 28, 2009 Added by:Jim Anderson
Although external forces including economic downturn and market specific slowdowns do have their impact, these external forces alone often cannot explain why information security makes so little progress. This phenomenon is often true even in situations where senior infosec leadership is experienced, holds multiple certifications, and otherwise commands an excellent grasp of the multip...
Comments (0)
A Host of Insecurities about Security
October 21, 2009 Added by:Sudha Nagaraj
Security concerns will continue to dominate the IT sphere for a while. Governments are crying hoarse to put in preventive measures, the security industry is struggling to make up for losses suffered in a recessionary environment, enterprises are growing paranoid about the ‘insider threat’ and the small and medium enterprises are waking up to the need for security management.
Comments (0)
Where are the DBAs?
October 07, 2009 Added by:Infosec Island Admin
What I really want to know is this: Where are the Database Admins (DBAs) these days? I cant tell you how many times in the past 18 months that I’ve found real enterprises running vulnerable databases with default passwords, weak passwords and no real permissions management.
Comments (3)
Why Infosec Languishes, Part 1
October 05, 2009 Added by:Jim Anderson
This subject has been simmering for a long time but the events of the unfolding economic crisis and so many colleagues and acquaintances in the industry who have suffered substantially in their efforts to advance information security within their organizations have prompted me to organize my thoughts in this area.
Comments (1)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids
- COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider