July 11, 2013 Added by:Rafal Los
Enterprises face some interesting challenges as they grow. Once you scale to any real size, tasks that seemed simple become unmanageable and difficult, even confused. One of those tasks is vulnerability management, and while it may sound simple and trivial, I assure you it is, indeed, not.
July 11, 2013 Added by:Jan Valcke
Security is not an optional feature to be implemented after the horse has bolted. Lack of security may have severe consequences and can result in destructed corporate image, severe revenue losses and liability suits. Strong authentication alleviates a lot of security concerns and can help build customer trust, credibility and can even become a competitive advantage.
July 10, 2013 Added by:InfosecIsland News
With APTs leveraging these weaknesses, it’s critical to have visibility and control of enterprise key and certificate inventories. Cyber criminals understand that the easy targets are those organizations that have little visibility into their threat surface and cannot respond quickly. We need to gain control over trust; we need to plug the gap related to key & certificate-based exploits. (Re...
NSS Labs' Defense In Depth Testing Reveals Weaknesses In Traditional Layered IT Security Strategies; No Clear And Present Winners
July 10, 2013 Added by:Joe Franscella
At the end of May, NSS Labs released its Correlation of Detection Failures report. In an accompanying news release, Are Security Professionals Overconfident in “Defense in Depth?”, the company said it was the culmination of a comprehensive in-lab test revealing that popular layered technology combinations are failing to protect organizations against exploits.
July 08, 2013 Added by:Brad Bemis
Introducing the term "Contextual-Relevance" into the security lexicon: For information security to function properly, it MUST take into account the unique organizational context that applies in any given situation. This fundamental concept is so crucial to the underlying fabric of a successful security program, that is pervades all aspects of the security function.
July 03, 2013 Added by:Phil Cox
On January 25, 2013, the U.S. Department of Health and Human Services (HHS) released the Omnibus Rule, which finalized all the former interim rules for Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health (HITECH) compliance.
July 02, 2013 Added by:Rafal Los
Very few companies are actively using security intelligence for better defense. What gives? This post will describe for you what I believe it means to extract value from security intelligence. And more important, why I believe three out of four enterprises are still failing to get that value.
July 01, 2013 Added by:Brad Bemis
Why are you always so negative about the state of the security industry and how we're fairing in the information protection game?
June 28, 2013 Added by:Edwin Covert
Organizations face a new threat to their information systems and intellectual property: advanced persistent threats, or APT. In order to detect and mitigate these attacks, organizations must develop a cyber-security capability that allows them to defend themselves.
June 25, 2013 Added by:InfoSec Institute
Greg Thompson has his work cut out for him as Scotiabank’s highest level security professional. Thompson, vice president of enterprise security services at the Toronto, Ontario-based entity, oversees a team responsible for ensuring that hackers, cyber terrorists and hacktivists don’t get bragging rights at company’s expense.
June 24, 2013 Added by:Larry Karisny
Knowing the reality and reasons behind cyberattacks, it’s time to stop talking and start offering resolution to these serious problems. There is no "it won’t happen to me" anymore. We must immediately deploy prevention and detection technologies to our critical processes or frankly, we could lose it all.
June 24, 2013 Added by:Ajay Kumar
In a recent incident, a hard drive containing personal information of 14K students were found unattended for up to 48 hours in the computer lab of Champlain College in Burlington, which could have led to exposed of 14K social security numbers. So what is the issue here? It is the failure of technology, process or people?
June 20, 2013 Added by:Rafal Los
Private industry and corporations alike are talking about “hack-back.” It’s no secret I believe that “hack-back” is a bad idea, for many reasons.
June 20, 2013 Added by:Eric Chiu
In a competitive business environment, reputation is a critical differentiator. Any company that suffers from a major data breach, instigated by an employee with a small grudge and big access, could face devastating consequences to the corporate brand, and to the bottom line.
June 19, 2013 Added by:Simon Moffatt
RESTful architectures have been the general buzz of websites for the last few years. The simplicity, scalability and statelessness of this approach to client-server communications has been adopted by many of the top social sites such as Twitter and Facebook. Why? Well, in their specific cases, developer adoption is a huge priority.
Looking Beyond "Black Box Testing"... Paul Reed on 12-03-2013
Projectile Dysfunction... ryan mccarthy on 12-01-2013
Mobile Security: Tips for Using Personal Dev... Shah Alam on 11-30-2013