Blog Posts Tagged with "Business"

Aecf1189abe745df32ec68f5864649a6

For Infosec Pros: How Firms Create Value

August 16, 2011 Added by:Nick Owen

My goal is to provide information security pros a basis for discussing risks with business pros. For information security pros, the goal should be to reduce the risks of cash flow streams so that the cost of capital for projects are less than the firms weighted-average cost-of-capital...

Comments  (0)

Af2769c2480db78c589b811b428782b0

Lush Suffers Another Predictable Compromise

February 15, 2011 Added by:Lee Mangold

Lush operates many web portals around the world providing beauty supplies. After their last breech, I decided to find out a little more about the company out of genuine interest about the company (rather than the breech). The first thing I noticed was that their lush.co.uk site was offline...

Comments  (0)

D10dcc9a486fad27327de115a81f51d8

The Second Law of Risk Management

February 14, 2011 Added by:Healthcare CSO

One of the most critical things that security practitioners tend to not get, to not understand, is that being part of the business means you contribute to the success of the business. Better information security, generally, is not considered contributing to the success of the business...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Mobile Hacking Business Threats for 2011

February 11, 2011 Added by:Headlines

Mobile attacks are proving easier for criminals to employ with greater success rates as opposed to PC based attacks, and with the dramatic increase in the volume of mobile transactions, cyber criminals are quickly adapting by shifting their focus...

Comments  (0)

B44a73900ca3197c2d8f148e303b3faa

Policies: What I Learned From Being a “Dummy”

February 10, 2011 Added by:Brad Bemis

I wonder what the world would be like if we wrote our policies and supporting documentation in a for-dummies-like format. Why? Because right now the common security policy fits the same bill that all those stuffy, confusing, technical references once did – and they simply don’t work...

Comments  (5)

959779642e6e758563e80b5d83150a9f

The Emotional Content of Security

February 06, 2011 Added by:Danny Lieberman

At the beginning, there was the notion of “selling security with FUD“, starting with anti-virus and peaking in the early 90s with the outbreak of RPC worms on Wall Street. It was pretty easy to sell security with FUD tactics. Then we had 9/11...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Government to Provide Intelligence on Cyber Threats

January 19, 2011 Added by:Headlines

"I think we all recognize that the government has unique access to information. We need to continue to look for ways to share that information, but also give our universities and our businesses information to be able to protect themselves..."

Comments  (0)

65be44ae7088566069cc3bef454174a7

Privacy Mistakes for Social Media and Marketing

November 30, 2010 Added by:Rebecca Herold

Creativity can quickly evolve into dangerous unbridled enthusiasm whenever new technologies or information services are discovered, and then lead to bad decisions with regard to the use of their customers’ and other consumer information...

Comments  (0)

Page « < 1 - 2 > »