Blog Posts Tagged with "Security Strategy"

69dafe8b58066478aea48f3d0f384820

UK Security Strategy to Focus on Trusted Computing

November 01, 2011 Added by:Headlines

"Building the most resilient cyber defenses in the world will not help if you are suffering from intellectual property theft. Trusted computing underpins security and can underpin growth, providing confidence in transactions, expanding markets and making them function more efficiently..."

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

UK Government to Strengthen Cyber-Warriors Force

October 17, 2011 Added by:Stefano Mele

Prime Minister David Cameron presented a response to issues raised by the Intelligence and Security Committee (ISC) in its 2010–2011 Annual Report, which expressed concerns at the inability of GCHQ, the British intelligence service, to retain internet specialists to respond to threats...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

How do You Evaluate a Risk Assessment?

September 29, 2011 Added by:Thomas Fox

The key to the Timken approach is the action steps prescribed by their analysis. This is another way of saying that the risk assessment informs the compliance program, not vice versa. This is the method set forth by the US Department of Justice in its Compliance Program best practices...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

INSA Releases Cyber Intelligence Report

September 13, 2011 Added by:Headlines

"We are not quite ready to propose a definitive definition... At this point, we are talking about threats that can originate anonymously within this cyber domain with potentially enormous consequences: physical destruction to economic chaos..."

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

On Disaster Recovery for SMBs

July 27, 2011 Added by:Ben Kepes

There really is no excuse for not having a good DR strategy in place – having come through a serious earthquake myself, and having to relocate businesses several times – I’ve seen the pain caused by a reliance on physical hardware that isn’t replicated elsewhere...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DoD Releases Strategy for Operating in Cyberspace

July 15, 2011 Added by:Headlines

"Given the integrated nature of cyberspace, computer-induced failures of power grids, transportation networks, or financial systems could cause massive physical damage and economic disruption. DoD operations—both at home and abroad—are dependent on this critical infrastructure...."

Comments  (13)

0a8cae998f9c51e3b3c0ccbaddf521aa

The (Almost) Budget-less CISO: Winning, Not Surviving

July 12, 2011 Added by:Rafal Los

As an enterprise-level security leader, your job is to secure the company. How does a huge budget help you achieve that? In reality, it doesn't. A huge budget is the signal that you've not understood your business well enough to apply the right controls in the right places...

Comments  (0)

959779642e6e758563e80b5d83150a9f

A Strategy for Combating Cyber Terror

July 05, 2011 Added by:Danny Lieberman

If we consider that cyber terror is not fundamentally different than bombers with suicide belts, we are drawn to consider the amount of damage caused by any terror attack whether on the street or in a database. Reducing the probability of attack means reducing the threat surface...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Dutch Cyber Security Council Now Operational

July 04, 2011 Added by:Don Eijndhoven

Though it is positive that the Cyber Security Council was made operational so quick, it is sad that the Dutch government did not provide a course for others to participate. Obviously the first batch of members have been hand-picked - it could hardly be called a democratic process...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Hey CISO, Your Budget is Killing You...

June 14, 2011 Added by:Rafal Los

You've wrestled with justifying initiatives, programs, and security-driven innovation you want to implement to keep the company safe and lower the risk profile, but what you may not know is that the budget you've been working so hard to grow may actually be secretly killing you...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Attribution Problems Hinder U.S. Cyberwar Strategy

June 07, 2011 Added by:Headlines

"The military is setting itself up for failure because attribution is difficult, and it's easy to spoof your identity thereby falsely implicating the wrong group. A military attack could be misplaced... but at the same time not responding will now be seen as a sign of weakness..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

Choosing an Enterprise eBanking Security Solution

June 06, 2011 Added by:Robert Siciliano

Recent technological advances have been vast and rapid. But after 15 years, online banking remains relatively immature, with a sometimes-inadequate security posture. You’re ebank is part of your business strategy, therefore security should be a part of your business strategy too...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DoD Plans Comprehensive Cyber Security Strategy

April 21, 2011 Added by:Headlines

Despite continued debate by security experts as to whether the concept of "cyber warfare" appropriately describes military actions conducted in an electronic medium, the Pentagon is moving forward with a declaration that cyberspace will be considered an operational domain...

Comments  (0)

B44a73900ca3197c2d8f148e303b3faa

Using NLP to Go Beyond “SMART” Goals

March 04, 2011 Added by:Brad Bemis

SMART goals are supposed to be Specific, Measurable, Achievable, Realistic, and Time-based. That seems pretty reasonable, so what’s missing? Neuro-Linguistic Programming introduces the concept of using a ‘well-formed’ outcome process – a process that makes your SMART goals even smarter...

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

Four Components of a Successful SSA Program

February 15, 2011 Added by:Rafal Los

Process can be outlined in documentation and stored on a network share or published in a booklet on everyone's desktop. Process can be a workflow-driven project management system that requires a security-infused approach from requirements gathering all the way through post-release...

Comments  (0)

Cccf3288436ddec8c2344cca4e69bc58

Mitigating Security Threats Through Forensic Psychology

February 06, 2011 Added by:Jonathan Dudek

Identifying the nature of threats - the motives and modi operandi of criminal groups and other critical factors contributing to their behavior, such as underlying cultural and political beliefs - will foster the development of appropriate risk mitigation strategies and safeguards at every level...

Comments  (2)

Page « < 1 - 2 - 3 - 4 > »