Blog Posts Tagged with "Security Management"


A Siri for Network Security: How Chatbots Can Enhance Business Agility

March 19, 2018 Added by:Avishai Wool

Professor Avishai Wool, co-founder and CTO of AlgoSec, takes a look at the role chatbots will imminently play in network security – and the benefits it will bring

Comments  (0)


Practical Security Management for Startups

July 22, 2011 Added by:Danny Lieberman

Startup management needs to know how much their information security measures will cost and how it helps them run the business. Business Threat Modeling (TM) is a practical way for a manager to assess the operational risk for the startup in dollars and cents...

Comments  (0)


The Long-Term Impact of Short-Term Problems

July 21, 2011 Added by:Rafal Los

How long do you suppose it will be before one of these companies that's had a catastrophic, board-level security awakening forgets it ever happened and goes back to it's old practices of ignoring security? Six months? A year? Three years?

Comments  (0)


The First Law of Risk Management

February 03, 2011 Added by:Healthcare CSO

Failure to escalate the risk to the management level with scope, authority and ability to manage the risk inevitably leads to a crisis. Every case of security crisis that I have ever been involved with inevitably had a situation where risk was being managed at the wrong level of the organization...

Comments  (0)


Security Information and Event Management Implementation

January 25, 2011 Added by:Anton Chuvakin

The book has unfortunate signs of being written by a team of others who didn’t talk to each other. Despite the promises of implementation guidance, it leaves some of the very complex SIEM issues untouched – and even unmentioned. Also, it is much stronger on the “what” then on “how"...

Comments  (0)


Getting Results the Wrong Way

January 03, 2011 Added by:Andy Willingham

Right results are not the measurement of success. How you arrive at the results is more important. It is not all about results. Of course results are important, done the right way. Lots of us in the community have been saying that the industry is broke and that we’re looking for ways to fix it...

Comments  (0)


Consider Security Before Introducing New Systems

November 02, 2010 Added by:Simon Heron

Unified communication can be a great aid to productivity by bringing together various communication tools such as IM, chat, click-to-call, video and VOIP calls. This can mean restructuring the corporate network. Again, there are important considerations involved in such a restructure...

Comments  (0)


The Business Case for a Next-Generation SIEM

October 31, 2010 Added by:Heather Howland

In the current economic climate, organizations face the difficult task of prioritizing where to spend their limited budgets so that they emerge from these uncertain times as viable companies. Feeling this pain most acutely are those who deliver critical network services and applications...

Comments  (0)


Essential Trust Analysis

October 26, 2010 Added by:Pete Herzog

In operational trust analysis, you learn to use logic and reason to make a trust decision. It is a new practice developed by ISECOM to explore operational trust in Trusted Computing as part of the EU's Open Trusted Computing (OpenTC) project...

Comments  (8)


Security: Do We Really Know What We Are Doing?

October 15, 2010 Added by:Andy Willingham

Fishnet security recently published Survey of Security and Data Trends. It seems to suggest that we have a lot of people filling Security rolls who aren’t qualified to fill those roles. Is this a story of companies who are just spending money for the sake of spending money?

Comments  (3)


On Truth in Security Packaging

October 13, 2010 Added by:Danny Lieberman

About the hype so prevalent in the information security industry - by now, most IT manager clients either don’t pay attention or discount the press releases and white papers. Man – that’s good news – because I find the entire FUD+PR person+Security Vendor triangle to be very problematic...

Comments  (5)


Top Five Things I’ve Learned in Enterprise InfoSec

September 30, 2010 Added by:Robb Reck

As information security professionals, we have an obligation to be more than a figurehead. As a CISSP I am bound by ISC2's Code of Ethics, which requires I provide diligent and competent service. I can hardly call my work diligent if I am approving everything to keep my customers happy...

Comments  (2)


Top 10 Reports for Managing Vulnerabilities

September 29, 2010 Added by:Sasha Nunke

This paper cuts through the data overload generated by some vulnerability detection solutions. It covers the key aspects of the vulnerability management lifecycle and shows what reports today's best-in-class organizations are using to reduce risks on their network infrastructure...

Comments  (0)


Are You Using Deprecated Security Guidelines?

September 29, 2010 Added by:Jamie Adams

Whether you adhere strictly to a particular set of industry standards or define your own security policies based on industry standards, you must be able to assess your server OSs on a regular basis and provide proof that they meet security requirements...

Comments  (1)


How Many Information Security Staff Do We Need?

September 26, 2010 Added by:Kurt Aubuchon

The right number of information security staff is highly sensitive to the nature of the business and the regulatory environment, or perhaps because the information security discipline is less mature than IT infrastructure, there just aren’t very many good benchmarks out there...

Comments  (4)


Managed Services’ Cost Saving Proposition

September 22, 2010 Added by:Rahul Neel Mani

Businesses are increasingly looking at managed services as a solution to create value proposition which includes both cost savings and a competitive advantage for themselves to achieve their transformational goals in terms of business and IT, as well as human capital...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »