March 03, 2014 Added by:Joe Weiss
There has been no mad rush for cyber insurance as the focus has been NERC CIP and compliance not security.
February 19, 2014 Added by:Anton Chuvakin
One of the key uses for threat intelligence (TI) data is making better threat intelligence data out of it.
February 04, 2014 Added by:Rafal Los
Demonstrating the effectiveness of a security program isn't about cherry-picking the right data sets, in the right time-frames to show how fantastic we are doing and patting ourselves on the back.
February 03, 2014 Added by:Brent Huston
When serious problems strike the complacent and unprepared, the result is inevitably shock followed by panic. And hindsight teaches us that decisions made during such agitated states are almost always the wrong ones. This is true on the institutional level as well.
January 22, 2014 Added by:Pete Herzog
Teach employees not to say no. This and 4 other unconventional tricks will build or enhance your organization's security culture.
December 04, 2013 Added by:Rohit Sethi
My colleague, Andre Harricharran, security consultant with Security Compass, offers a closer look at the mobile application assessment process and requirements, and what organizations should consider when procuring this type of service
November 19, 2013 Added by:Rohit Sethi
An information security training program is crucial for ensuring and maintaining a good security posture; in order to effectively manage this program you have to be able to measure it. This article introduces a concept recommended by NIST in their Special Publication 800-16, for evaluating training effectiveness.
November 18, 2013 Added by:Vince Schiavone
To achieve advance warning of risks and threats, corporations now require social intelligence as the backbone of their crisis management strategy. This is no different than the way military or intelligence organizations operate – knowledge is power and propagates effective response.
November 12, 2013 Added by:Jason Clark
Security Advisor Alliance is a nonprofit group of Top security leaders from the Global 1000 who have come together to donate time each week to help our peers in any area of security as a pro-bono service.
October 22, 2013 Added by:Vince Schiavone
As the “social age,” “mobile age” and “consumer age” converge, enterprise risk is experiencing a evolutionary shift due to the array of complex emerging threats that are challenging corporations on various levels. With billions upon billions of daily social discussions from consumers, influencers, competitors, activists, journalists and regulators, an entirely new social dimension of r...
October 03, 2013 Added by:Vince Schiavone
To help executives understand and address the growing dangers of social risks threatening their revenue and reputation, I assembled a consortium of academic and commercial experts spanning social intelligence, enterprise risk, digital privacy, communications and security to write the industry’s first comprehensive handbook on the topic.
September 11, 2013 Added by:Rohit Sethi
Let’s say you’ve just had a pen test or security scan performed on your application. You review the list of findings and get to work on remediation. Apart from obvious shortcomings of any individual single assessment technique, you may also be doing a disservice to meeting your business goals.
Why Enterprises Are Struggling So Much with ... Eric Kronthal on 03-07-2014
Making Sense of Split Tunneling ... nat ravitz on 03-07-2014
Patching WordPress Username Disclosure... Neo on 03-07-2014