Blog Posts Tagged with "Information Security"
May 04, 2011 Added by:Robb Reck
Creating secure systems from the ground up requires different skills than buying and bolting on technologies to implement security after the fact. You have the chance to build this new system with a strong foundation. Do not miss your chance to show how security should be addressed...
May 04, 2011 Added by:Alex Hamerstone
Search engines place a vast body of human knowledge at your fingertips. This vast knowledge often includes the intellectual property of others. Finding policies on the internet and using control H to place your organization’s name in place of another is not only wrong, it is also ineffective...
May 04, 2011 Added by:Gurudatt Shenoy
Unless people take seriously the risks of online commerce and information sharing, it is not going to get better any time soon. My message is simple, I should be the owner and manager of my information and security, not some data center administrator on the cloud...
May 03, 2011 Added by:Eric Irvin
It's important that we continue to listen as much as we talk, and dissect statements, data, and ideas as critically as possible. As the world of Information Security grows, we can not afford to be spoon-fed our thoughts and ideas from speakers, magazine articles, and vendors...
May 03, 2011 Added by:Emmett Jorgensen
USB flash drives are far too beneficial to be banned outright and avoided. Used with the correct combination of security features, they are a major asset to most organizations, providing a portable platform for storage and applications needed in today's corporate IT environments...
May 03, 2011 Added by:Alex Hamerstone
As far as information security, every organization will have a unique set of foundational policies. Although there will be many that are common to all organizations, the unique qualities of each organization call for custom policies. How then, do we determine what basic policies we need?
May 02, 2011 Added by:Brent Huston
Adding something you are to something you have and something you know makes it much more difficult to spoof identity, but still doesn’t render it impossible. And imagine the inconvenience. Seems like way too much just to protect some financial data or health information, huh?
April 29, 2011 Added by:Scot Terban
Never mind if you work in a job that requires security, everyone should be cognizant when they are online talking to someone that they do not know in real life. From the common data thief to the corporate spy, we all may have data that someone wants and is willing to lie to get it...
April 28, 2011 Added by:Allan Pratt, MBA
What are the data security and compliance implications if you have all of your confidential data on your computer hard drive or laptop? What if you are a policeman, school teacher, or lawyer – and the contact list on your phone includes information you are legally bound to not share?
April 27, 2011 Added by:Mike Meikle
How will infosec be impacted by the push toward Smart Grid technologies? Information security skills encompassing everything from applications to hardware will be in great demand. The collected data needs to be securely protected when utilized by the consumer and provider...
April 22, 2011 Added by:Headlines
What constitutes an acceptable level of information security risk in an environment when intellectual property, personal customer information and the brand are at stake? It’s a tough decision, but one that should be made to form the foundation of an information security program...
April 22, 2011 Added by:Headlines
The responsibility for protecting personal identifying information is on those who request and store it. All entities that collect personal information need to understand the concept that only they can safeguard our information, and that this safeguarding must be an urgent priority...
April 21, 2011 Added by:kapil assudani
Business use cases must be consumed by the IT group to build functional/non-functional requirements. Security mis-use cases in their remediated language turn into functional/non-functional requirements. If security is engaged - we translate them into detailed technical requirements...
April 20, 2011 Added by:Robb Reck
The primary issue is that the skills that make for a great IT professional are not the same that make for a great information security professional. IT professionals manage systems, information security professionals manage risk...
April 18, 2011 Added by:kapil assudani
In many companies, the culture is to embrace security only where it is absolutely necessary, and this usually comes through corporate security policies and industry regulations. Beyond these, security groups hardly have any teeth - unless its a critical security issue...
April 15, 2011 Added by:kapil assudani
In many organizations the CISO reports to the CTO – which usually results in a conflict of interest. The goals of IT groups are performance and speedy implementation, which usually takes precedence over security considerations. As a result, security takes a back seat..
Steps Toward Weaponizing the Android Platfor... Freid Jerome on 05-17-2013