Items Tagged with "Data Loss Prevention"


94c7ac665bbf77879483b04272744424

The Virtual Sky is Falling!

May 28, 2012 Added by:Marc Quibell

Opportunists are using an alarmists strategy, bolstered by bloated opinions, to get you to buy their stuff. IT Sec businesses and vendors are not objective sources for security trends, threats and/or events. They are advertisements...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

Is Security Broken? How I Propose to Fix It...

May 23, 2012 Added by:PCI Guru

In a true war, we would be investing in creating an offensive capability to go into cyber-battle with the enemy. And while there are discussions about having offensive capabilities, security professionals are still in a defensive posture protecting the organization...

Comments  (2)

959779642e6e758563e80b5d83150a9f

How to Secure Patient Data in a Healthcare Organization

May 23, 2012 Added by:Danny Lieberman

If you are a HIPAA covered entity, securing patient data is central to your business. If you are a big organization, you probably don’t need my advice. If you are small to mid-size provider without a large budget, the question is “How can I do this for as little money as possible?”

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Data Mining A Mountain of Zero Day Vulnerabilities

May 22, 2012 Added by:Fergal Glynn

Information leakage happens when sensitive information is displayed to the a user inadvertently. An example would be pathnames or database IP addresses returned within an error message to a user. An attacker can use this information to undermine the system...

Comments  (0)

145dfdfe39f987b240313956a81652d1

Small Merchant Data Security: Helping Them Help Themselves

May 17, 2012 Added by:Stacey Holleran

Many small merchants—whether selling online or brick-and-mortar, or both—don’t have the technological background to understand the steps necessary for protecting the cardholder information and other sensitive data that passes through (and may be stored in) their business systems...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Attack Surface: Medical Devices and the Public Health Sector

May 17, 2012

This bulletin highlights how the portability and remote connectivity of medical devices introduce additional risk into Medical IT networks and failure to implement a robust security program will impact the organization’s ability to protect patients and their information...

Comments  (0)

2e541940bc9b12ea62726bb51ed8787d

BYOD - It's a Personal Matter

May 16, 2012 Added by:Phil Klassen

When you own something, especially a mobile device, there is a sense of entitlement that the individual has. So it's critical that you establish the fact that using a personal device to do company business is a privilege, not a right, and that privilege can be taken away...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Why Security Through Obscurity Still Does Not Work

May 15, 2012 Added by:Rebecca Herold

I know from my years as a systems analyst and maintaining a large change control system that it is easy for mistakes to occur within the network security architecture, and that there will always be some humans involved who are tempted to bypass important security controls...

Comments  (0)

94c7ac665bbf77879483b04272744424

Where is My Information?!?!

May 10, 2012 Added by:Marc Quibell

Here's the problem - too many people have too much information about you, stored in or on who-knows-what, and who-knows-where. The risks of having your identity stolen and used are astronomical. All it requires is someone on the receiving end putting it all together...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Logging: Opening Pandora's Box - Part 2 - Elation

May 10, 2012 Added by:Rafal Los

Once you get over the anxiety of logging, a wave of elation generally hits. Whether you're getting excited about being able to catch evil-doers in the act, or the capability to notice system failures before they happen logging can save your skin more than you'd think...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Healthcare Data and the (Private) Social Network

May 09, 2012 Added by:Danny Lieberman

Previously, we talked about the roles that trust, security and privacy play in online healthcare interactions. In this post we look at privacy challenges in social networks and describes how you can implement a private healthcare social network for without government regulation...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Logging: Opening Pandora's Box - Part 1 - Anxiety

May 09, 2012 Added by:Rafal Los

You're probably worried that log analysis is going to consume all of your time, or you'll find out that your organization has been pwn3d for years and all your data has been exfiltrated in real-time and your latest database is being copied off to China... aren't you?

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

The CERT Guide to Insider Threats

May 07, 2012 Added by:Ben Rothke

While there are many books on important security topics such as firewalls, encryption, identity management and more, The CERT Guide to Insider Threats is the one of the first to formally tackle the devastating problem of trusted insiders who misappropriate data...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Healthcare Data: I Trust You to Keep this Private

May 03, 2012 Added by:Danny Lieberman

In this article, Danny Lieberman talks about the roles that trust, security and privacy play in online healthcare interactions. At the end of the article, he introduces the idea of private social networking for healthcare – leaving the piece open for a sequel...

Comments  (2)

8fcd3af85e00d8db661be6a882c6442b

What Good is PCI-DSS?

May 02, 2012 Added by:david barton

Credit card processors have valuable information that bad guys would love to get their hands on. So processors are the Fort Knox of the modern world. When bad guys are motivated, no amount of security can keep them out. Does that mean PCI-DSS standards are worthless?

Comments  (9)

A88973e7d0943d295c99820ab9aeed27

Protecting Data in Use

April 26, 2012 Added by:Simon Heron

The security of data in use is about risk mitigation. However, with the current targeted attacks and the proliferation of zero day threats, the risk level is high. It is necessary that action is taken to implement the required precautions that reduce the risk to an acceptable level...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »