Blog Posts Tagged with "Security Strategies"

D551093f5d8af724e17929c91eb90d63

Social Business Security and Risk Management Strategies

January 18, 2012 Added by:Andrea Zapparoli Manzoni

This is not something that the Marketing Department can handle alone, nor IT, not even the Security Team the Legal Department: all will fail if given the task of managing an organization's Social Business Strategy outside a multidisciplinary and truly integrated approach...

Comments  (0)

C70bb5cfd0305c9d18312d92f820c321

On Defending Networks

January 13, 2012 Added by:Gabriel Bassett

If we can secure areas of the world existing in at least 3 domains (land, air, and space) if not four (adding sea), then we should easily be able to train to defend networks existing in a single domain (digital)...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Analyzing the Poneman Study on Privileged Users

December 29, 2011 Added by:Rafal Los

How much access do those employees and system administrators have to your critical intellectual property, company secrets and other secret information? And how often do they take a peek behind the curtain... you know, just for curiosity?

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Data Loss Prevention - Step 1: Know What's Important

December 12, 2011 Added by:Rafal Los

It's important to understand what your company does and then figure out what the critical bits are. Sometimes it's your customer lists, or a secret ultra-high efficiency engine design, or the next big thing in stealth bombers. The point is that you simply need to know your business...

Comments  (0)

112497d0d46922d314cacb13897ebf75

Cracking the Code of Silence on Meaningful Security Metrics

December 06, 2011 Added by:Elizabeth Ireland

It’s ironic, but security policies themselves make it difficult for management to understand the relative value of various security investments, to pinpoint areas of risk, and to translate that information into continuous security improvements...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Executives Lack Confidence in Infosec Strategies

December 04, 2011 Added by:Bill Gerneglia

Cyber attacks grow as corporations and governments amass information on individuals in complex networks across the Web, and cyber activists - some motivated by money, others by the desire to destabilize corporations and governments, continue to hack into organizational secrets...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Protecting and Promoting the UK in a Digital World

November 28, 2011 Added by:Headlines

"With greater openness, interconnection and dependency comes greater vulnerability. The threat to our national security from cyber attacks is real and growing. Organised criminals, terrorists, hostile states, and ‘hacktivists’ are all seeking to exploit cyber space to their own ends"...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Enterprise Security: Over Budget, Over Extended, Under Prepared

November 11, 2011 Added by:Rafal Los

When your organization's house is on fire, the pressure's on to put it out immediately rather than worry about long-term sustainability. The best time to formulate a strategy is pre-breach. Unfortunately, this is often the time when you probably won't have the funds... details, details...

Comments  (1)

E313765e3bec84b2852c1c758f7244b6

Controlling Valuable Data By Using Maps

November 10, 2011 Added by:Brent Huston

As the battle rages, attackers look for every angle they can leverage in order to access your data. Our team has spent countless hours discussing the importance of identifying what ‘valuable data’ means, learning where that data lives, and understanding how it is accessed...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Sony Hacked Again... ESI to the Rescue?

October 14, 2011 Added by:Rafal Los

Getting hacked isn't necessarily Earth shattering anymore. Enterprises need to make their peace with fact that they're going to have to live with data breaches and hacks. The secret to surviving is having a well-formed Enterprise Security Intelligence strategy...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NATO to Lead Multinational Cyber Defense Effort

September 23, 2011 Added by:Headlines

“In the spirit of the Secretary General’s call for 'smart defense' through multinational efforts, the aim is to lower the cost of and facilitate national capability development. In the interconnected world of cyber space, we are only as strong as the weakest link...”

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Solution Architecture: A Critical Service or Sales Talk?

June 08, 2011 Added by:Rafal Los

Over time the term has become widely over-used to the point where meaning is largely lost, and sadly most people on the buyer side of the aisle think it's just some marketing term or a way to get them to buy more of whatever widget is being sold...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NATO: Cyber Defense and the New Strategic Concept

May 27, 2011 Added by:Headlines

Cyber attacks offer vastly favorable cost-benefit ratios in comparison to conventional military options. It is increasingly probable that a cyber attack on a NATO country will precede, or even replace a physical assault, moving cyber issues to the forefront of security concerns...

Comments  (0)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

Fourteen Important Security Policy Strategies

May 24, 2011 Added by:Global Knowledge

In light of today's information economy, security is essential across every aspect of both small and large organizations. Without sensible security, an organization is at risk not only from malicious outsiders but also ill-intentioned employees or random mistakes...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Obama's Cybersecurity Plan Gets Lukewarm Reception

May 20, 2011 Added by:Headlines

"Overall, the proposals are disappointing compared with what the president said in his 2009 policy statement... [and] when you look at some sections, it appears to give DHS some broad authorities here that concern us." said Larry Clinton, president of the Internet Security Alliance...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Obama Delivers Cybersecurity Strategy to Congress

May 12, 2011 Added by:Headlines

“We are now in a world in which cyber warfare is very real. It could threaten our grid system. It could threaten our financial system. It could paralyze this country, and I think that's an area we have to pay a lot more attention to..."

Comments  (0)

Page « < 4 - 5 - 6 - 7 - 8 > »