Blog Posts Tagged with "Security Strategy"

9259e8d30306ac2ef4c5dd1936e67634

BS 25999-2 Implementation Checklist

November 23, 2010 Added by:Dejan Kosutic

Your management has given you the task to implement business continuity, but you're not really sure how to do it. Although it is not an easy task, you can use the BS 25999-2 methodology to make your life easier - here are the main steps necessary to implement this standard...

Comments  (0)

959779642e6e758563e80b5d83150a9f

What is Security?

November 19, 2010 Added by:Danny Lieberman

It’s clear that a driver with a lighter foot will get better mileage, and perhaps spending less money on security technology and more on security professionals will get you better return on your investment. Challenge your assumptions about what is effective security in your organization...

Comments  (9)

6429389c5e8a4c9555be876f8484331a

The Big Shift to Cloud-Based Security

November 14, 2010 Added by:Sasha Nunke

Keeping IT systems secure and running within regulatory compliance mandates, especially for mid-sized and even small businesses, seems next to impossible. There are many reasons for this – but fortunately, several recent technological trends show that it doesn’t have to be this way...

Comments  (1)

Ebb72d4bfba370aecb29bc7519c9dac2

What Should I Want? Or How NOT to Pick an SIEM

November 12, 2010 Added by:Anton Chuvakin

The allure of asking that question is truly irresistible when dealing with somebody who – presumably – knows more than you do about a particular subject. I am not shocked when a SIEM prospect asks that question of a vendor sales guy or – slightly better – a field engineer...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Top Five Mistakes CIOs Often Make

November 10, 2010 Added by:Danny Lieberman

As long as the earth doesn’t move, you’re safe - but once things start, you can drop into a big hole. Most security vulnerabilities reside in the cracks of systems and organizational integration and during an M&A, those fault lines can turn security potholes into the Grand Canyon...

Comments  (4)

6429389c5e8a4c9555be876f8484331a

Understanding and Selecting a Database Assessment Solution

November 09, 2010 Added by:Sasha Nunke

Database Assessment is not just a security precaution, but an integral part of database operations management. Databases form the backbone of every major application within the data center, which makes their stability and security both critically important to business operations...

Comments  (0)

70e177868d7bc383ce3ea10b6f976ada

Searching for Return on Security Investments

November 02, 2009 Added by:Andrew Baker

There are several major challenges to the successful implementation of good information security in many organizations today.  It is not because business owners do not think that security is important.  No, the issues exist because they do not grasp the complexities that embody the Information Security profession, and thus make decisions that fail to account for the many nuances of a pro...

Comments  (5)

Abceedf5017915685f379075f00a5ccd

A Host of Insecurities about Security

October 21, 2009 Added by:Sudha Nagaraj

Security concerns will continue to dominate the IT sphere for a while. Governments are crying hoarse to put in preventive measures, the security industry is struggling to make up for losses suffered in a recessionary environment, enterprises are growing paranoid about the ‘insider threat’ and the small and medium enterprises are waking up to the need for security management.

Comments  (0)

C7159a557369b66632c4b54bf746b69e

The parallels between Information Security & Sun Tzu’s-The Art of War

October 13, 2009 Added by:Sean Inman

Correlations between Sun Tzu's Art of War and Information Security from Steve Pinman. "I think most organizations can demonstrate a well thought out plan(s) for dealing with “predictable” security attacks such as viruses and DDoS attacks, but how many organizations are actively engaged in planning for new threats and new attack vectors?"

Comments  (1)

Page « < 1 - 2 - 3 - 4 > »