Blog Posts Tagged with "Security Management"


3 Basic Elements to Network Forensics Solutions

August 11, 2010 Added by:Ray Tan

The information forensic analysis provides can lead to an informed and efficient security posture within an organization to deter similar attacks in the future. As criminals get smarter and savvier, being able to detect and characterize attacks is crucial...

Comments  (0)


IT Security History and Architecture - Part 1

August 11, 2010 Added by:Dr. Steve Belovich

Scant attention is paid to the serious vulnerabilities of software assets, e.g., the source code base, make files, module management systems, libraries, etc. due to poorly-planned access mechanisms and deployment...

Comments  (3)


Risks Of Phone Removal From University Dorm Rooms

August 11, 2010 Added by:shawn merdinger

There is no easy solution to this dire situation. Universities are forced to make cost cuts in this poor economy, and telecommunications overhead like dorm phones is a easy measure to take, but the increased risk and costs are at this point not worth it...

Comments  (0)


Capsa Free - The Terminator of Wireshark?

August 09, 2010 Added by:Ray Tan

Wireshark, the world's foremost network protocol analyzer, is well known for its powerful decoding abilities and its multi-platform support. Several days ago one of my friends called me happily wanting me to have a look at a GUI network analyzer: Capsa free...

Comments  (2)


Converged Infrastructure Means Endless Possibilities

August 04, 2010 Added by:Rahul Neel Mani

In an exclusive interview Dave Donatelli, EVP and GM, Enterprise Servers, Storage and Networking, at Hewlett Packard spoke to Rahul Neel Mani in Las Vegas during HP Tech Forum on Converged Infrastructure...

Comments  (0)


Value Added Teaming for Security Projects

August 03, 2010 Added by:Jon Stout

IDIQ procurements, although offering multi-year streams of business, are very competitive and winning requires a team with high value added and a competitive edge. This is particularly true regarding procurements and solicitation from the Intelligence Community...

Comments  (0)


Bullet Proof Hosting: Financing and Payment

August 02, 2010 Added by:Nathaniel Markowitz

Strengths, Weaknesses, Opportunities and Threats (SWOT) analysis is a method used by organizations to maximize effectiveness. Generally, these groups analyze internal and external factors to generate strategies to strengthen their business or organizational model...

Comments  (0)


Mandatory Disclosure: A Hazard for Infosec?

July 30, 2010 Added by:Niels Groeneveld

Management teams prefer to reduce risk and cost. The legislation forces companies to disclose breaches, but does not force companies to find them. Given these circumstances, a possible option to reduce risk is to decrease the chance that security breaches will be found...

Comments  (3)


10 Reasons for Ongoing Policy and Procedure Management

July 28, 2010 Added by:Katie Weaver-Johnson

Based on lessons learned and today's highly litigious, increasingly-regulated and safety-oriented society, it is critical for organizational policies and procedures to be clearly defined and communicated...

Comments  (1)


Is Wikileaks the Biggest Threat to National Security?

July 27, 2010 Added by:Mark Gardner

What the files show are intimate details of the war in Afghanistan between Jan 2004 to Dec 2009. Irrespective of the nature of the information, it is those on the front line who potentially could suffer the most...

Comments  (4)


Security - A Reason to Fire Employees or an Excuse?

July 27, 2010 Added by:Niels Groeneveld

Think twice before you advice to dismiss an employee – assess all interests involved, and make a risk assessment to assess the potential business impact of your advice. And try to avoid becoming a tool of HR managers who want to get rid of people...

Comments  (8)


Still Using Excel for Risk Assessments?

July 27, 2010 Added by:Danny Lieberman

Risk assessment data and analysis with Excel is a collection of brittle, unwieldy, two dimensional worksheets is a really bad way of doing multi-dimensional modeling...

Comments  (0)


Do you Need the Ultimate Countermeasure?

July 24, 2010 Added by:Ron Lepofsky

IT security groups that are feeling pressure from their external auditors, their IT security governance committee, or from their compliance committee to provide the next level of compliance and security assurance need to pull out the big gun...

Comments  (3)


Compliance - Don't Be a Box Checker

July 22, 2010 Added by:Bryan Miller

Whether the data represents your personal health records, your financial statements or your latest credit card bill, the goal is the same. The guardians of that data have a legal, ethical, moral and some would say religious obligations to protect that data...

Comments  (1)


Weaponizing the Nokia N900 - Part 1

July 22, 2010 Added by:shawn merdinger

From a surveillance aspect, think of bad people with n900s in their pockets running Asterisk servers on their phones and connecting to each other point-to-point over encrypted tunnels - now that's a challenge...

Comments  (2)


A Contractor Solution for Cyber Warriors

July 22, 2010 Added by:Jon Stout

The bottom line is that the Federal Government needs highly qualified cyberwarriors in order to protect the welfare of the nation. When one compares this specialized need, the best choice is contractor provided employees...

Comments  (7)

Page « < 1 - 2 - 3 - 4 - 5 > »