Blog Posts Tagged with "Security Management"

259aa33b32fc31717e8a18f2dc9edc19

A Siri for Network Security: How Chatbots Can Enhance Business Agility

March 19, 2018 Added by:Avishai Wool

Professor Avishai Wool, co-founder and CTO of AlgoSec, takes a look at the role chatbots will imminently play in network security – and the benefits it will bring

Comments  (0)

959779642e6e758563e80b5d83150a9f

Practical Security Management for Startups

July 22, 2011 Added by:Danny Lieberman

Startup management needs to know how much their information security measures will cost and how it helps them run the business. Business Threat Modeling (TM) is a practical way for a manager to assess the operational risk for the startup in dollars and cents...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Long-Term Impact of Short-Term Problems

July 21, 2011 Added by:Rafal Los

How long do you suppose it will be before one of these companies that's had a catastrophic, board-level security awakening forgets it ever happened and goes back to it's old practices of ignoring security? Six months? A year? Three years?

Comments  (0)

D10dcc9a486fad27327de115a81f51d8

The First Law of Risk Management

February 03, 2011 Added by:Healthcare CSO

Failure to escalate the risk to the management level with scope, authority and ability to manage the risk inevitably leads to a crisis. Every case of security crisis that I have ever been involved with inevitably had a situation where risk was being managed at the wrong level of the organization...

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Security Information and Event Management Implementation

January 25, 2011 Added by:Anton Chuvakin

The book has unfortunate signs of being written by a team of others who didn’t talk to each other. Despite the promises of implementation guidance, it leaves some of the very complex SIEM issues untouched – and even unmentioned. Also, it is much stronger on the “what” then on “how"...

Comments  (0)

11146d62a6c31fb9fac8ac8ac991e08d

Getting Results the Wrong Way

January 03, 2011 Added by:Andy Willingham

Right results are not the measurement of success. How you arrive at the results is more important. It is not all about results. Of course results are important, done the right way. Lots of us in the community have been saying that the industry is broke and that we’re looking for ways to fix it...

Comments  (0)

A88973e7d0943d295c99820ab9aeed27

Consider Security Before Introducing New Systems

November 02, 2010 Added by:Simon Heron

Unified communication can be a great aid to productivity by bringing together various communication tools such as IM, chat, click-to-call, video and VOIP calls. This can mean restructuring the corporate network. Again, there are important considerations involved in such a restructure...

Comments  (0)

1961d93172f8088a077c52e638e31f41

The Business Case for a Next-Generation SIEM

October 31, 2010 Added by:Heather Howland

In the current economic climate, organizations face the difficult task of prioritizing where to spend their limited budgets so that they emerge from these uncertain times as viable companies. Feeling this pain most acutely are those who deliver critical network services and applications...

Comments  (0)

1789975b05c7c71e14278df690cabf26

Essential Trust Analysis

October 26, 2010 Added by:Pete Herzog

In operational trust analysis, you learn to use logic and reason to make a trust decision. It is a new practice developed by ISECOM to explore operational trust in Trusted Computing as part of the EU's Open Trusted Computing (OpenTC) project...

Comments  (8)

11146d62a6c31fb9fac8ac8ac991e08d

Security: Do We Really Know What We Are Doing?

October 15, 2010 Added by:Andy Willingham

Fishnet security recently published Survey of Security and Data Trends. It seems to suggest that we have a lot of people filling Security rolls who aren’t qualified to fill those roles. Is this a story of companies who are just spending money for the sake of spending money?

Comments  (3)

959779642e6e758563e80b5d83150a9f

On Truth in Security Packaging

October 13, 2010 Added by:Danny Lieberman

About the hype so prevalent in the information security industry - by now, most IT manager clients either don’t pay attention or discount the press releases and white papers. Man – that’s good news – because I find the entire FUD+PR person+Security Vendor triangle to be very problematic...

Comments  (5)

C787d4daae33f0e155e00c614f07b0ee

Top Five Things I’ve Learned in Enterprise InfoSec

September 30, 2010 Added by:Robb Reck

As information security professionals, we have an obligation to be more than a figurehead. As a CISSP I am bound by ISC2's Code of Ethics, which requires I provide diligent and competent service. I can hardly call my work diligent if I am approving everything to keep my customers happy...

Comments  (2)

6429389c5e8a4c9555be876f8484331a

Top 10 Reports for Managing Vulnerabilities

September 29, 2010 Added by:Sasha Nunke

This paper cuts through the data overload generated by some vulnerability detection solutions. It covers the key aspects of the vulnerability management lifecycle and shows what reports today's best-in-class organizations are using to reduce risks on their network infrastructure...

Comments  (0)

4085079c6fe0be2fd371ddbac0c3e7db

Are You Using Deprecated Security Guidelines?

September 29, 2010 Added by:Jamie Adams

Whether you adhere strictly to a particular set of industry standards or define your own security policies based on industry standards, you must be able to assess your server OSs on a regular basis and provide proof that they meet security requirements...

Comments  (1)

972cda1e62b72640cb7ac702714a115f

How Many Information Security Staff Do We Need?

September 26, 2010 Added by:Kurt Aubuchon

The right number of information security staff is highly sensitive to the nature of the business and the regulatory environment, or perhaps because the information security discipline is less mature than IT infrastructure, there just aren’t very many good benchmarks out there...

Comments  (4)

F520f65cba281c31e29c857faa651872

Managed Services’ Cost Saving Proposition

September 22, 2010 Added by:Rahul Neel Mani

Businesses are increasingly looking at managed services as a solution to create value proposition which includes both cost savings and a competitive advantage for themselves to achieve their transformational goals in terms of business and IT, as well as human capital...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »