Infosec Island Security News Digest for 8-16-2010

Monday, August 16, 2010

Infosec Island Admin

7fef78c47060974e0b8392e305f0daf0

Cloud Delivered Security – Solutions for Your Business  What is needed when considering cloud delivered security versus on-site security is experience and knowledge. Choosing the right combination depends on a number of factors, but to create a comprehensive security system it must be backed up by strong procedures...

Conducting After Hours Security Reviews  There are many instances of security guards doing bad things with the information they come across, along with the cleaning staff, maintenance workers and other employees. Here are eighteen common vulnerabilities to get you started...

Continuous Monitoring and FCPA Compliance  The cost of an internal investigation can easily reach the millions of dollars, yet some companies choose to avoid the proactive compliance costs and instead rely on bare bones programs and reactive strategies. Reactive approaches are clearly a mistake...

Summertime Scams and Identity Theft  For everything in life, there is a corresponding scam. Scammers spend their energy trying to separate hardworking, law-abiding citizens from their money, and they’ll take advantage of any opportunity to do so. this summer's hottest scams include:

Now Scale Up is Out and Scale Out is In  Being at the helm of product development for nearly two decades in the company, Roland Slee, Vice President, Oracle Database Product Management Team, in conversation with Rahul Neel Mani, thinks it is about time the industry reconsiders the way it computes....

Maintaining Information Privacy and Security  Regular evaluation of training programs and internal procedures related to information security must be undertaken to ensure each employee is completing the necessary steps to safeguard information...

The Valley of Death Between IT and Infosec  There is a fundamental divide, a metaphorical valley of death of mentality and skill sets between IT and security professionals: IT is about executing predictable business processes, and security is about reducing the impact of unpredictable events...

Zeus Botnet TCP/IP Packet Capture in Netwitness Investigator  Ever wonder what a Botnet really looks like? Here is a look at a packet capture of the Zeus Botnet as viewed in the Netwitness Investigator program, which was the first to detect the Kneber botnet...

InfosecIsland.com is a vendor-neutral professional community committed to serving the needs of SMBs and mid-market enterprises, and large corporations across multiple industries, government agencies, educational organizations, legal, financial, and healthcare sectors. Memberhsip is free - join today!

Possibly Related Articles:
7153
Infosec Island
Infosec Island
Post Rating I Like this!
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.