Blog Posts Tagged with "Communication"


The Private Communication Encryption Conundrum

July 08, 2013 Added by:Keith Mendoza

Demanding that communication providers offer encryption of private communication is great; however, there are major hurdles that needs to be overcome from a technological and usability standpoint.

Comments  (0)


Social Engineering: What the Heck Was I Doing? Part 1

September 26, 2012 Added by:Will Tarkington

The method I used for this particular tactic was to monitor the conversational rhythm. Then inject into it and take it over allowing me to guide the conversation. The skill set that allows you to walk into a conversation and take it over can’t be understated...

Comments  (0)


How Do You Change an Unhealthy Compliance Culture?

August 29, 2012 Added by:Thomas Fox

The best way to effect culture “is to combine strong leadership with the existing internal elements of a healthy corporate culture... while it may take as long to create a good culture as it does to establish a good reputation, a strong set of values is usually harder to destroy unless the company is itself dismantled..."

Comments  (0)


Silly Putty and Compliance: Remember It’s Not Always About You

August 08, 2012 Added by:Thomas Fox

This is not the problem where the legal department or compliance department is viewed as the Land of No, inhabited by only Dr. No. It is, instead, the perception that legal or compliance simply institutes requirements without even talking to the people they affect the most, the business unit employees...

Comments  (1)


Huawei Boasts of Remote Data Interception Capabilities

June 19, 2012 Added by:Headlines

“Embedding these capabilities in any network means…(that) they can then intercept and control those networks... I am so worried about Chinese cyber warfare threats, their abilities to monitor and remotely shut down international communications networks, including critical infrastructure networks"...

Comments  (1)


Communication is King in E-Discovery Matters

May 10, 2012 Added by:Bill Gerneglia

A common vocabulary is certainly emerging making dialog between counsel and technologists productive and effective. However, equally important is that lawyers engage their client’s technology team in dialog on e-discovery issues because when counsel fails, the fall out can be costly...

Comments  (0)


Helpdesk to the Boardroom

April 16, 2012 Added by:Daniel Blander

As security professionals, we eagerly hone our skills and immerse ourselves in the latest research. Yet too many of us feel that we are marginalized, and become frustrated at our lack of professional advancement. What could be the problem and how can we overcome it?

Comments  (0)


NSA Denies Warrantless Wiretaps Despite Evidence

March 27, 2012 Added by:Electronic Frontier Foundation

The NSA claims it only has access to emails and phone calls of non-U.S. citizens overseas, but many previous reports that the program targets US based email records. In the 11 years since 9/11, Binney estimates 15 to 20 trillion transactions have been collected and stored by the NSA...

Comments  (0)


Communication is the Key to Security

January 19, 2011 Added by:Mike Meikle

There is a sea change taking place in information technology however. The consumerization of the enterprise by the infiltration of mass market technology has lowered the drawbridge and allowed many unauthorized devices and services to stream in and out of the corporate network...

Comments  (0)

Most Liked