March 15, 2011 Added by:Ben Zvaifler
The Cyber Security Strategies Summit will focus on education, the key to navigating the security landscape in a world of uncertainty. Whether you are managing new initiatives, implementing new programs or designing new technologies, being informed is the deciding factor in winning the cyber war...
March 15, 2011 Added by:Ron Baklarz
The App Genome Project was created as an ongoing effort to provide insight into mobile market dynamics, gain insight into how mobile apps access personal data and sensitive capabilities on mobile devices, and identify security threats in the wild...
March 15, 2011 Added by:Brent Huston
While good security processes might help you generate metrics and real world threat insights that you can use to explain risk to your management, as the old saying goes, if they spend more on coffee than infosec, they will get hacked and they will deserve it...
March 14, 2011 Added by:J. Oquendo
Forget about what is coming into and what is leaving your network. The goal: Quit trying to get people to STOP knocking on your door, focus on getting your people to stop wasting time and resources in ANSWERING the door when they know by this point in time there will be no-one there...
March 14, 2011 Added by:Roman Yudkin
As employees continue to use their smartphones for both personal and business purposes, businesses must begin implementing stringent security measures and educating their employees on the importance of protecting the mobile devices and specific applications with layers of authentication...
March 14, 2011 Added by:David Navetta
Privacy-related lawsuits are on the rise, and this time Amazon.com is the target. On March 2, 2011, two named plaintiffs filed a class-action lawsuit alleging that Amazon circumvents browser privacy settings to collect users’ personal information without permission and shares the information with third parties...
March 14, 2011 Added by:Bill Gerneglia
Network administration specialists were expected to be in most demand. These were cited at possible tough hires by 65 percent of CIOs. Windows Server administrators were next, at 60 percent, followed by desktop support at 57 percent and database management at 52 percent...
March 14, 2011 Added by:Anton Chuvakin
That SIEM appliance might set us back $75,000 in hard earned security budget dollars, but how much more will we have to spend in the next 3 years deploying, integrating, using, tuning, cursing, expanding the thing? How much manpower will the new operational procedures cost us?
March 14, 2011 Added by:Jon Stout
Risk to federal cyber security introduced by an emerging technology is inversely proportional to the convenience it offers. Every few years a hot capability comes along that instantly has businesses clamoring to adopt it, while security professionals scramble to address its vulnerabilities...
March 13, 2011 Added by:Anthony M. Freed
"Apple doesn't have a perceived security problem by customers and so they haven't had a need to invest heavily in it. I've done what I can to try to educate people that Apple products aren't magical and can have security problems like every other product..."
March 13, 2011 Added by:Rafal Los
I wanted to buy more than the site offered me at one given purchase. So I set the hamster loose on the wheel and tried something interesting that should never have worked. This type of vulnerability is a manipulation of application business logic and again, should never, ever work...
March 13, 2011 Added by:Don Eijndhoven
Cyber Warfare is a fringe area. Information Security is poorly understood by the mainstream populace, a fact well evidenced by the digital exhibitionism taking place on the various social networking sites. In fact, it is even poorly understood within the IT sector itself...
March 13, 2011 Added by:Ron Lepofsky
Electrical utilities are already challenged with the process of becoming certified for compliance with the NERC CIP standard for IT security. The NERC CIP standard is evolving, thank goodness. Perhaps you haven’t noticed the innocuous sounding proposed new standard now in the creation process...
March 13, 2011 Added by:Robert Siciliano
A recent Scripps Howard News Service investigation analyzed more than 1.4 million ID theft records from the U.S. Federal Trade Commission from 2005 through early 2010. In it they found that fraud complaints about stolen tax return-related identity theft jumped nearly 300 percent...
March 12, 2011 Added by:Kevin L. Jackson
The INSA Cloud Computing Task Force, as an element of the INSA Cyber Security Council, will focus on ways to enhance adoption of cloud computing for national security missions. TechAmerica announced the formation of a "cloud computing commission" to advise the White House...
March 12, 2011 Added by:Thomas Fox
Many companies focus on the specifics of a best practices FCPA compliance program, we believe they should also make documentation an over-arching principal in their compliance programs. Everything done or performed within the context of your FCPA compliance program should be documented...
March 12, 2011 Added by:David Navetta
The Court's decision reversed a Court of Appeals’ holding that corporations could prevent the release of information subject to a FOIA request on the basis of an exemption that shields information that "could reasonably be expected to constitute an unwarranted invasion of personal privacy”...
March 11, 2011 Added by:Rahul Neel Mani
Carlos Solari Vice President Cyber Technology and Services, CSC in an exclusive conversation with Rahul Neel Mani speaks on how organizations should deal with their security framework at the design stage...
March 11, 2011 Added by:Dan Dieterle
It looks like Microsoft may be forced into making a decision. To change and adapt to the times, or continue with business as usual and end up becoming obsolete. But hey, they still have the XBox right?
March 11, 2011 Added by:Robert Siciliano
Criminals almost duped a man into handing over remote access to his computer, along with all his personal and financial information. The so-called technician started by telling the man his computer had sent an error message to Microsoft and he was calling to help him rectify the problem...