Blog Posts Tagged with "Security Management"

85ac6feb584b665e85664974c546cfec

3 Basic Elements to Network Forensics Solutions

August 11, 2010 Added by:Ray Tan

The information forensic analysis provides can lead to an informed and efficient security posture within an organization to deter similar attacks in the future. As criminals get smarter and savvier, being able to detect and characterize attacks is crucial...

Comments  (0)

800ca77bf7ad76b2a830356569e524b7

IT Security History and Architecture - Part 1

August 11, 2010 Added by:Dr. Steve Belovich

Scant attention is paid to the serious vulnerabilities of software assets, e.g., the source code base, make files, module management systems, libraries, etc. due to poorly-planned access mechanisms and deployment...

Comments  (3)

E376ca757c1ebdfbca96615bf71247bb

Risks Of Phone Removal From University Dorm Rooms

August 11, 2010 Added by:shawn merdinger

There is no easy solution to this dire situation. Universities are forced to make cost cuts in this poor economy, and telecommunications overhead like dorm phones is a easy measure to take, but the increased risk and costs are at this point not worth it...

Comments  (0)

85ac6feb584b665e85664974c546cfec

Capsa Free - The Terminator of Wireshark?

August 09, 2010 Added by:Ray Tan

Wireshark, the world's foremost network protocol analyzer, is well known for its powerful decoding abilities and its multi-platform support. Several days ago one of my friends called me happily wanting me to have a look at a GUI network analyzer: Capsa free...

Comments  (2)

F520f65cba281c31e29c857faa651872

Converged Infrastructure Means Endless Possibilities

August 04, 2010 Added by:Rahul Neel Mani

In an exclusive interview Dave Donatelli, EVP and GM, Enterprise Servers, Storage and Networking, at Hewlett Packard spoke to Rahul Neel Mani in Las Vegas during HP Tech Forum on Converged Infrastructure...

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Value Added Teaming for Security Projects

August 03, 2010 Added by:Jon Stout

IDIQ procurements, although offering multi-year streams of business, are very competitive and winning requires a team with high value added and a competitive edge. This is particularly true regarding procurements and solicitation from the Intelligence Community...

Comments  (0)

63b96d79afc327c98a13c614670feca0

Bullet Proof Hosting: Financing and Payment

August 02, 2010 Added by:Nathaniel Markowitz

Strengths, Weaknesses, Opportunities and Threats (SWOT) analysis is a method used by organizations to maximize effectiveness. Generally, these groups analyze internal and external factors to generate strategies to strengthen their business or organizational model...

Comments  (0)

37f65c068b7723cd7809ee2d31d7861c

Mandatory Disclosure: A Hazard for Infosec?

July 30, 2010 Added by:Niels Groeneveld

Management teams prefer to reduce risk and cost. The legislation forces companies to disclose breaches, but does not force companies to find them. Given these circumstances, a possible option to reduce risk is to decrease the chance that security breaches will be found...

Comments  (3)

Dd9902bc56a9d85cdc62c00083ea4871

10 Reasons for Ongoing Policy and Procedure Management

July 28, 2010 Added by:Katie Weaver-Johnson

Based on lessons learned and today's highly litigious, increasingly-regulated and safety-oriented society, it is critical for organizational policies and procedures to be clearly defined and communicated...

Comments  (1)

1f2f664e68a603b3c54890fbbcd37857

Is Wikileaks the Biggest Threat to National Security?

July 27, 2010 Added by:Mark Gardner

What the files show are intimate details of the war in Afghanistan between Jan 2004 to Dec 2009. Irrespective of the nature of the information, it is those on the front line who potentially could suffer the most...

Comments  (4)

37f65c068b7723cd7809ee2d31d7861c

Security - A Reason to Fire Employees or an Excuse?

July 27, 2010 Added by:Niels Groeneveld

Think twice before you advice to dismiss an employee – assess all interests involved, and make a risk assessment to assess the potential business impact of your advice. And try to avoid becoming a tool of HR managers who want to get rid of people...

Comments  (8)

959779642e6e758563e80b5d83150a9f

Still Using Excel for Risk Assessments?

July 27, 2010 Added by:Danny Lieberman

Risk assessment data and analysis with Excel is a collection of brittle, unwieldy, two dimensional worksheets is a really bad way of doing multi-dimensional modeling...

Comments  (0)

5a432ca05467666d90425b7b869c5003

Do you Need the Ultimate Countermeasure?

July 24, 2010 Added by:Ron Lepofsky

IT security groups that are feeling pressure from their external auditors, their IT security governance committee, or from their compliance committee to provide the next level of compliance and security assurance need to pull out the big gun...

Comments  (3)

F8f122d50eba11c3af5607575b277bc6

Compliance - Don't Be a Box Checker

July 22, 2010 Added by:Bryan Miller

Whether the data represents your personal health records, your financial statements or your latest credit card bill, the goal is the same. The guardians of that data have a legal, ethical, moral and some would say religious obligations to protect that data...

Comments  (1)

E376ca757c1ebdfbca96615bf71247bb

Weaponizing the Nokia N900 - Part 1

July 22, 2010 Added by:shawn merdinger

From a surveillance aspect, think of bad people with n900s in their pockets running Asterisk servers on their phones and connecting to each other point-to-point over encrypted tunnels - now that's a challenge...

Comments  (2)

98180f2c2934cab169b73cb01b6d7587

A Contractor Solution for Cyber Warriors

July 22, 2010 Added by:Jon Stout

The bottom line is that the Federal Government needs highly qualified cyberwarriors in order to protect the welfare of the nation. When one compares this specialized need, the best choice is contractor provided employees...

Comments  (7)

Page « < 1 - 2 - 3 - 4 - 5 > »