Security Management

3026fa994d431ada923190b72e84fda4

The Evolving Value of Event Data for Effective Security

November 26, 2013 Added by:Danny Banks

Innovative enterprise security teams realize the importance of security event data and are changing the way they collect and store information for greater insight into the threat landscape.

Comments  (0)

C6b9a422851928980389afe33c48e213

Cybersecurity Meets Psychology – Microsoft & Maslow

November 26, 2013 Added by:Eric Cissorsky

If you're an SMB owner/partner, IT manager or part of the IT staff take some time to think about how your organizations security practices meet these needs. Do they? If not, at what level is there a problem? I

Comments  (0)

219bfe49c4e7e1a3760f307bfecb9954

How Do I Measure the Success of a Training Program?

November 19, 2013 Added by:Rohit Sethi

An information security training program is crucial for ensuring and maintaining a good security posture; in order to effectively manage this program you have to be able to measure it. This article introduces a concept recommended by NIST in their Special Publication 800-16, for evaluating training effectiveness.

Comments  (0)

4c8a80b80e239c2dd6cd6f8760e10e5f

The Dimensions of Detecting a Social Crisis

November 18, 2013 Added by:Vince Schiavone

To achieve advance warning of risks and threats, corporations now require social intelligence as the backbone of their crisis management strategy. This is no different than the way military or intelligence organizations operate – knowledge is power and propagates effective response.

Comments  (0)

52a995fead03e1d828980d4b3efd2719

What the Snowden Leaks Can Teach Us About Data Security

November 14, 2013 Added by:Cam Roberson

One of the major issues discussed in the wake of the National Security Agency leak involving Edward Snowden was how the government can prevent a similar leak from happening in the future. This article looks at several specific measures that can strengthen data security, making it more difficult for bad actors to break into the system, and tougher for them to make off with sensitive information onc...

Comments  (0)

54b393d8c5ad38d03c46d060fa365773

Security Advisor Alliance, A Nonprofit of Elite CISOs giving back to the community.

November 12, 2013 Added by:Jason Clark

Security Advisor Alliance is a nonprofit group of Top security leaders from the Global 1000 who have come together to donate time each week to help our peers in any area of security as a pro-bono service.

Comments  (0)

219bfe49c4e7e1a3760f307bfecb9954

Why Manual Testing is Worth the Extra Buck: Weighing the Pros & Cons

November 12, 2013 Added by:Rohit Sethi

Businesses often ask for guidance on whether they need to do a manual penetration test for a specific application or if automated testing suffices. Here I try to briefly describe some of the advantages and disadvantages of each method and explain our preferred approach.

Comments  (1)

54b393d8c5ad38d03c46d060fa365773

Creating Change: Why I am Moving to Accuvant as Chief Strategy & Security Officer

November 11, 2013 Added by:Jason Clark

I’m extremely excited to announce that I’ve embarked on the next phase of my professional journey. I’ve joined Accuvant in the newly created position of Chief Security and Strategy Officer, working alongside some of the most talented security professionals in the world to innovate and develop strategic solutions that solve the specific security problems organizations of all sizes face today.

Comments  (0)

219bfe49c4e7e1a3760f307bfecb9954

Security Training Program – Fixed or Customized?

November 07, 2013 Added by:Rohit Sethi

Vishal Asthana, takes a closer look at key questions to ask when implementing a software developer security training program.

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Is Your Business Ready for Cyber Monday?

November 06, 2013 Added by:Allan Pratt, MBA

Cyber Monday is the day when all employers cringe. This is because many employees will spend a portion of their day making online holiday purchases instead of working.

Comments  (0)

631e72bff10f695d4be8dec9d08d7534

Preparing for the Internet of Things: Integrating Strong Authentication in Daily Life

November 04, 2013 Added by:Jochem Binst

The online world as we know it today is not the same as the one we got to know in the beginning of the Internet era and certainly not the one that is emerging today! People worldwide are starting to realize this. All they have to do now is act on it. Strong authentication to secure the online world will be embraced since it becomes a necessity; using strong authentication is the next step.

Comments  (0)

65c1700fde3e9a94cc060a7e3777287c

The Road To Identity Relationship Management

November 04, 2013 Added by:Simon Moffatt

The modern enterprise workforce, will contain contractors, freelancer and even consumers themselves. Bloggers, reviewers, supporters, promoters, content sharers and affiliates, whilst not on the company payroll, help drive revenue through messaging and interaction. If a platform exists where their identity can be harnessed, a new more agile go to market approach can be developed.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Vehicle VPNs, Part One: The ‘Connected Car’

October 28, 2013 Added by:Patrick Oliver Graf

Remember, anything that is connected to the Internet is a potential target for hackers and cyber criminals. If they’ll hack your smartphone, tablet or laptop computer, who is to say they won’t try to do the same to your car?

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

A Renaissance in the Manufacturing and Industrial Sectors

October 24, 2013 Added by:Rafal Los

After what appears to be decades of systematically ignoring security challenges, the recent climate of breaches seems to have shaken something loose. Purse strings have loosened. Boards have begun to ask security questions when they have never done so before. And most of all, I'm seeing several organizations formally hiring CISOs and giving them both accountability and control over the security fu...

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Developing a Comprehensive Remote Access Security Framework: Identities and Roles

October 22, 2013 Added by:Patrick Oliver Graf

Every enterprise should consider implementing a comprehensive remote access security framework in light of increased workplace mobility and the BYOD trend.

Comments  (0)

4c8a80b80e239c2dd6cd6f8760e10e5f

Social Threats of Greatest Risk Concern for Executives

October 22, 2013 Added by:Vince Schiavone

As the “social age,” “mobile age” and “consumer age” converge, enterprise risk is experiencing a evolutionary shift due to the array of complex emerging threats that are challenging corporations on various levels. With billions upon billions of daily social discussions from consumers, influencers, competitors, activists, journalists and regulators, an entirely new social dimension of r...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »