Blog Posts Tagged with "Security"
September 30, 2011 Added by:Ken Stasiak
With Enterprise Risk Management (ERM) comes a comprehensive risk assessment equation and process. Defining one process that can be used and incorporated into the entire organization will allow for conformity, efficiency, and effective alignment between departments...
September 17, 2011 Added by:PCI Guru
there is no such thing as a perfect security framework because as I have said time and again – wait for it – security is not perfect. For those of you that are implicitly selling security to your management as perfect need to stop it. You are doing the security profession a disservice...
September 16, 2011 Added by:Infosec Island Admin
There will always be elements within the company with impetus to not take your advice on security matters and maybe even give you a large amount of pushback. This is especially true of any company that has little to no security posture to start with. So who are the key client players?
September 14, 2011 Added by:Infosec Island Admin
I have heard others lament the state of the “security industry” and have posted about my own adventures in the land of FUD and Security Theater as well as a side trip into the lands of denial. My goal with this series is to cover the players, the game, and the realities of the security business...
September 12, 2011 Added by:Kanguru Solutions
Every organization has different needs. What works for one may not work for another. Size, budget, personnel, and structure all play a factor in determining what an organization will do in terms of IT security. There generally is no “one size fits all” solution when it comes to Infosec...
September 07, 2011 Added by:Craig S Wright
SCADA systems and other critical infrastructure is taken for granted and we forget just how much of our lives are managed through private systems. Exploits have been noted as being of critical concern in US government briefs. We also forget that SCADA systems are connected to the world...
September 06, 2011 Added by:Steven Fox, CISSP, QSA
Optimal utilization of security policies relies on the audience for which they are created. Policy creation and marketing must recognize and capitalize on organizational culture to promote its value proposition. People can be the strongest link in the security chain...
September 06, 2011 Added by:Headlines
The Sony breach saga began in April when the PlayStation network servers had been hacked, exposing the records of more than 70 million customers. Sony then discovered that the Online Entertainment network had also been compromised, exposing another 25 million records...
September 06, 2011 Added by:Craig S Wright
So, when all is said and done, we have not really changed much as a species. We love to believe that we as a generation are forging something new and facing problems that no other has faced before, but in reality, the analogy remains as it is always likely to remain. Change is the only constant...
August 24, 2011 Added by:Headlines
"Any change to the way a customer accesses their account is going to take a while to get used to. But this small extra step delivers such an increase in security to our internet banking users, that we are confident we have got the balance right," an HSBC official said...
August 19, 2011 Added by:Headlines
The guide offers some fairly good advice and illustrative graphics on how to spot common scams and other mischief. It is written in simple enough terms that you, your kids, and your grandparents can all increase your Facebook security outlook a great deal in a matter of only a few minutes...
August 18, 2011 Added by:Robert Siciliano
Mobile users have recently captured the attention of cyber criminals. The Department of Homeland Security and the STOP. THINK. CONNECT. program recommends the following tips to help you protect yourself and to help keep the web a safer place for everyone...
August 15, 2011 Added by:Simon Heron
Remember that scene in the Matrix where our hero Neo is on the run and he just grabs a phone off some bystander and is immediately able to cancel the existing call and dial a new one? That seemed totally believable at the time. I just wondered what the equivalent might be these days?
August 15, 2011 Added by:Headlines
Unlike other authentication systems, the breach of biometric data is difficult to remedy. Users can not simply alter the authenticating data used to access secure networks, as one would with usernames and passwords - the data is permanently and uniquely identifiable to the individual user...
August 13, 2011 Added by:Kelly Colgan
Parents can’t supervise their teens around the clock. So how can you protect your fiercely independent, world-weary, tech-savvy teen—the one with the bad case of selective hearing—from trouble online? Let us do the talking with these tips...
August 12, 2011 Added by:Robert Siciliano
In Minnesota prosecutors put away a “depraved criminal” for 18 years as a result of virtually torturing his neighbors via their Wi-Fi connection. After a brief encounter with his new neighbors he began “a calculated campaign to terrorize his neighbors”...
Hacker to Release Symantec's PCAnywhere Sour... Kajal Singh on 04-21-2015
Financial Malware Fell in 2014 As Takedown O... Kajal Singh on 04-21-2015
Weaknesses in Air Traffic Control Systems ar... Kajal Singh on 04-21-2015