Latest Blog Posts


The Delivery of Customer’s Electronic Financial Statements using Enterprise Rights Management.

April 13, 2010 Added by:Peter Abatan

Post has been and is quickly becoming an increasing challenge for many organisations of all sizes. Apart from the security issues of financial data getting lost before delivery, spiralling costs of running mailing centres, postal strikes and the increasing cost of postage, businesses and organisations want to embrace technology as an alternative to using post

Comments  (1)


A New Communications Protocol

April 12, 2010 Added by:Bill Wildprett, CISSP, CISA

As information security professionals, a common refrain we hear is how difficult, but essential it is to communicate the whys, hows, and whats of security to management, other business units, partners, vendors, customers, etc.,  Whether its meaningful security metrics or why compliance is just the beginning of the whole security process, better communication can yield better resul...

Comments  (0)


Zuckerburg: Privacy is No Longer a Social Norm

April 12, 2010 Added by:Theresa Payton

Are you one of the over 350 Million people that use Facebook to keep in touch with friends and family? According to Hitwise, Facebook briefly surpassed Google as the most visited site in the world during the Christmas season. The founder of Facebook said that privacy is no longer a social norm.

Comments  (2)


I'm not OK - And Why You Should Care

April 10, 2010 Added by:Steven Fox, CISSP, QSA

The SOW just came through on a new client.  You do some research and find that they just cut their staff by 20% – and you are the lucky security professional that gets to do their PCI compliance review!  You file this in the back of your mind as an environmental factor and proceed to prepare for the engagement.  After all, what matters here is the review, right?

Comments  (0)


10 Personal Safety and Security Tips

April 10, 2010 Added by:Robert Siciliano

Fundamentals: Body language is 55% of communications. That’s your walk, posture, facial expressions and eye contact. Awareness is being alert to your surroundings at all times. Intuition is when the hair on the back of your neck stands on end. Voice tone and pitch equal 35% of communications. The way a person communicates physically and verbally can determine whether or not a predator deems ...

Comments  (6)


A perspective on the theft of confidential documents by former employee at Ford.

April 09, 2010 Added by:Peter Abatan

When I read that a former Ford product engineer had stolen over 4000 confidential documents containing trade secrets from his former employer, I began to wonder how many companies out there are as vulnerable to the same degree as Ford. Fortunately for Ford this employee got caught, but it remains unknown how many employees have successfully got away without Ford’s knowledge?

Comments  (6)


ISAlliance Expresses Tentative Support for Cyber Legislation

April 08, 2010 Added by:Marjorie Morgan

On Wednesday, March 24, the Senate Commerce Committee became the first Congressional Committee to approve a comprehensive cybersecurity bill. The "kill-switch" provision (turning off the Internet) and federally mandated technical standards on the private sector have been eliminated from earlier versions of the legislation and the bill now embraces private sector standards and market incentiv...

Comments  (0)


Vector 2 Data Sanitizing

April 08, 2010 Added by:Mark Bennett

Ever wonder if the data on your hard drive is recoverable after a format? Thinking about throwing out that old hard disk you don't need anymore? Perhaps selling the computer on EBAY? You lost a USB stick at the supermarket, but you think you are ok because you deleted the data previously? THINK AGAIN!

Comments  (0)


New Regulations Will Not Prepare the US for Cyberwar

April 08, 2010 Added by:Richard Stiennon

Senators Rockefeller and Snowe have formulated a new Cybersecurity bill that they describe in today’s Wall Street Journal.  (Use Google news to get to the full article.)  The Bill as proposed will be very disruptive to the operations of every business and will do essentially nothing to prepare the US for cyberwar.

Comments  (0)


How Does Your Organisation’s Executives Communicate Confidential Information?

April 08, 2010 Added by:Peter Abatan

Trade secrets, executive orders, press briefs, corporate strategies and tactics are all confidential communication tools that could impact the shareholder value of a business. If a press brief is released earlier than is should be, it could cause the net worth of the business to fall. Likewise if an executive communication that is meant for internal use only is released into the public d...

Comments  (0)


Fed Guidelines for Social Media Review part II

April 07, 2010 Added by:Mike Meikle

I promised in my last post to walk you through the various supporting documents that are tied to the Feds’ Social Media Guidelines.  Also, I will act as translator for all the corporate/government  speak.   This way lies madness, abandon all hope ye who enter, etc.

Comments  (0)


Using Facebook to Steal Company Data

April 07, 2010 Added by:Robert Siciliano

There is a reason why computer users are called “users.” Like crack addicts who are drug users, more is never enough. And when under the influence, people do stupid things. I find myself scanning the Dell catalog like it’s the latest (or any) Victoria Secrets catalog.

Comments  (5)


AntiMistake Software – Preventing Human Error and Lack of Awareness

April 07, 2010 Added by:Katie Weaver-Johnson

Successful organizations realize antivirus software must be installed on all PCs.  Antivirus software works well if updates are automatic and ongoing (as new risks and threats are identified) to prevent expensive damages to PCs, information and reputations. 

Comments  (1)


Data Security - It's a responsibility, not an option...

April 07, 2010 Added by:Ian Barrs

"We need to talk about security, it's becoming an issue." This is a line that would draw a blank on many a CEOs face, even today. "We've got strong password policies, and no-one's allowed to use USBs", the CEO may burble. If that's your last line of defence, and you merely trust people to follow the rules, you're heading for trouble.

Comments  (0)


How to Protect Your Privacy After You Die

April 06, 2010 Added by:Rebecca Herold

Some time ago, I read a news report about a family who wanted to obtain the email messages of their son who had been killed in Iraq. Wow.  I hadn’t thought about all my electronic virtual possessions, such as emails and files.

Comments  (2)


Be careful Your PC Isn’t Held for Ransom

April 06, 2010 Added by:Robert Siciliano

Computerworld reported that a hacker threatened to expose health data and demanded $10 million from a government agency. The alleged ransom note posted on the Virginia DHP Prescription Monitoring Program site claimed that the hacker had backed up and encrypted more than 8 million patient records and 35 million prescriptions and then deleted the original data. “Unfortunately for Virginia, the...

Comments  (0)

« First < Previous | 471 - 472 - 473 - 474 - 475 | Next > Last »