Blog Posts Tagged with "Business"
Enterprise Security: Being Your Own Worst Enemy
August 30, 2012 Added by:Rafal Los
Enterprise security organizations can be their own worst enemies. Security is largely disconnected from the business, largely dependent on technology, and unable to be anything more than a cost center... and it seems like the more we rant and wave our arms the deeper the hole gets...
Comments (0)
The Cloud: It’s About Flexibility
August 21, 2012 Added by:Ben Kepes
As far as I’m concerned, the future will see a gradual shift from on-premise, to private cloud, to public cloud – that’s a factor of economics and scale. But the bottom line is that cloud isn’t about meeting a series of technical check boxes; it’s about meeting the needs of the business...
Comments (0)
Lessons in the Evolution of Compliance in China
August 16, 2012 Added by:Thomas Fox
As Chinese companies engage with partners, globally and locally, their internal and external business practices are evolving. The article “The Myths of Gift Giving” found that many Chinese companies now put greater emphasis on professionalism and building trust and confidence in business capabilities...
Comments (0)
The Role of the CIO: What’s Really at Stake
August 08, 2012 Added by:Robert Siciliano
The CIO has become as important as the CEO. It’s a pivotal position that often can make or break the success of a corporation. As criminal hackers have launched campaigns against numerous organizations, the CIO has become much more than an information officer. They are the guardian of corporate secrets...
Comments (0)
Symantec Does Not Need Better Operations, It Needs Innovation
August 04, 2012 Added by:Richard Stiennon
The company dominates its market and any tweaks to operational efficiencies such as pairing down the product catalog, rationalizing SKUs, normalizing points given to distributors, and optimizing sales, R&D, marketing, and the executive office, will lead to greater profitability and stock performance...
Comments (1)
Unmasking Agility: Cloud Reality or Myth of Marketing Hype?
April 30, 2012 Added by:Rafal Los
Agility is the ability of the IT department to provide services that adapt to the changing needs of your organization faster than before, with on-premise servers, systems and staff. Increasing your business' agility means that IT has done something to contribute to a business...
Comments (0)
Security Measures to Protect Business Twitter Accounts
April 27, 2012 Added by:Robert Siciliano
Hacking a business Twitter account is a favorite pastime for those wanting retribution, and for others it’s just plain fun. Once the businesses Twitter account is hacked their reputation is sullied making them look like they aren’t protecting their client’s data either...
Comments (0)
More on the IT Business Boiling Point
April 22, 2012 Added by:Ben Kepes
This tension between old and new is interesting to watch and has some interesting parallels within organizations. I’m talking about the tension that exists between IT and business units. The former who want to ensure security and control, the latter who simply want to get stuff done...
Comments (0)
Cloud Adoption Tension: IT vs Business
April 19, 2012 Added by:Ben Kepes
On the side of IT it’s all about security, control and transparency. On the side of the business, it’s years of frustration at slow and cumbersome IT procurement processes – they want to get stuff done. It’s fair to say that we’re still in the Wild West of cloud adoption...
Comments (0)
Why Security is in Trouble
April 10, 2012 Added by:Rafal Los
Everything you do as an infosec leader needs to be aligned to your organization's mission statement and goals. Everything you do, every security-related decision you make, and every purchase and project you sign off on must first and foremost be aligned to the organization...
Comments (1)
China, Cyber Warfare and Challenges for the Future
April 09, 2012 Added by:Plagiarist Paganini
China's growing presence in cyber space will result in an increase in cyber operations against the nation. Due to the imbalance between an aggressive cyber offense its weak cyber defense capabilities, it could be the origin of significant technological problems for China...
Comments (0)
Digital Assassination: Protecting Your Business Against Attacks
April 05, 2012 Added by:Ben Rothke
The Internet is being used to destroy brands, reputations, and people’s well-being. These incidents range from inappropriate use of Facebook and blog postings to bogus Wikipedia entries to blatant Internet-based character assassination, and much more...
Comments (0)
Is it Time to Reinvent the CISO?
March 13, 2012 Added by:Rafal Los
Is the CISO willing to take on more business-focused responsibilities, and look at information security from a less technical solution-oriented perspective - and if so is that sustainable? If you're looking for advice I have a little bit here for you...
Comments (1)
Top Security Company Acquisitions of 2011
January 31, 2012 Added by:Bill Gerneglia
The acquisition pace in the security industry has been steady the last few years due to the global proliferation of security breaches. Will this acquisition pace continue? Many analysts believe it will accelerate to address the proliferation of global security threats...
Comments (0)
Cyber Threats: From Military to Economic
January 12, 2012 Added by:Plagiarist Paganini
Governments around the world are gearing up to cope with this massive technology call to arms. The awareness of the threat and risks are high and this made it necessary, despite the struggling economy, the allocation of large sums of money to prepare for the new emergency...
Comments (0)
Financial Analysis for Infosec Professionals
August 23, 2011 Added by:Nick Owen
My goal is to provide infosec professionals a basis for discussing risks with business professionals - especially finance people - and to dispel some myths. The goal of this post is to lay some groundwork for proper financial analysis techniques - or at least minimize the dumber ones...
Comments (0)
- University of Arizona Researchers Going on Offense and Defense in Battle Against Hackers
- Securing the Internet of Things (IoT) in Today's Connected Society
- What Is Next Generation SIEM? 8 Things to Look For
- Cybersecurity and Online Trading: An Overview
- Artificial Intelligence: The Next Frontier in Information Security
- Five Main Differences between SIEM and UEBA
- For Cybersecurity, It’s That Time of the Year Again
- Myth Busters: How to Securely Migrate to the Cloud
- Microsoft Makes OneDrive Personal Vault Available Worldwide
- Human-Centered Security: What It Means for Your Organization