Blog Posts Tagged with "Innovation"


On the Sustainability of Information Security

April 25, 2012 Added by:Rafal Los

The only way that information security can be a group of outliers is if we're considering ourselves within the entirety of the IT realm. While this would be great for my ego to think that myself and all my peers are just smarter than everyone else in IT, I know this to be false...

Comments  (0)


From Obstacle to Ally - Repositioning the Security Team

March 30, 2012 Added by:Steven Fox, CISSP, QSA

Rarely are non-security staff engaged in risk control discussions – a lack of interaction that disenfranchises those who will interact with the controls. This engenders a sense of powerlessness that leads to passive sabotage of initiatives intended to further the business...

Comments  (0)


Seven Problems with Cell Phone Forensics

March 26, 2012 Added by:Bozidar Spirovski

Manufactures don’t always know how to retrieve data stored in new phones, so how do investigators do it? Staying up-to-date is challenging but not impossible. As criminals come up with new ways to abuse them, strangely enough, this can be beneficial for forensics...

Comments  (5)


Innovation and Compliance

March 26, 2012 Added by:Thomas Fox

Can compliance be innovative? Or can innovation inform your compliance program? Innovation in the compliance arena is key. As compliance programs mature and as companies mature in their approach to compliance, innovation will continue to lead best practices...

Comments  (0)


EFF to European Parliament: Protect Coders’ Rights

March 05, 2012 Added by:Electronic Frontier Foundation

EFF asked Parliament to protect the rights of researchers and whistleblowers. In the course of fixing a problem they could inadvertently violate laws and by reporting a vulnerability researchers could risk exposure to a lawsuit or criminal investigation...

Comments  (1)


RSA Conference 2012 Wrap-Up

March 04, 2012 Added by:Robb Reck

RSA 2012 is in the books. The crypto-geniuses have gone home and are again working on solving our most challenging technical problems. The rest of us have returned home with some new insights and an improved plan for implementing security in our own little corners of the world...

Comments  (0)


Continuous Patching: Is it Viable in the Enterprise?

February 28, 2012 Added by:Rafal Los

The way patching works right now on all different levels I'm surprised anything works because we have operating system patches going in with application patches - and we're all just a heartbeat away from catastrophe. Maybe more continuous patching can be our savior...

Comments  (2)


Security: UR Doin It Rong

February 22, 2012 Added by:Wendy Nather

A number of talks at conferences focus on what we are doing wrong. The reason for this is practitioners are afraid to talk about how they're defending themselves for fear that someone will take it as a challenge and de-cyber-pants them before they've even gotten to the Q&A session...

Comments  (3)


The CISO as a Capable Catalyst

February 22, 2012 Added by:Rafal Los

"If a CISO initially receives any capability when starting the position, that was capability that was left over from their predecessor. It is now the CISO's responsibility to earn more capability and solidify what may already exist..."

Comments  (2)


Infosec: Where is Our “Long Tail”?

February 20, 2012 Added by:Dave Shackleford

The “long tail” concept illustrates the subtle, often overlooked 20% market that tends to be more niche. We need those organizations that are desperate to find unusual solutions that are not available at all right now. And we need small startups to provide them...

Comments  (2)


The Proliferation of Cyber Janitors

January 20, 2012 Added by:

What we really need in this industry is a complete shake up. We need true innovative thought that uses cyber intelligence, counterintelligence and active defense and offensive measures in our programs. No more sitting around waiting for the penetration...

Comments  (3)


US Air Force Solicits Cutting Edge Cyber Technologies

January 18, 2012 Added by:Headlines

"The Air Force is seeking information on revolutionary hardware and software cyber technology and systems as well as innovative Tactics, Techniques, and Procedures (TTP) that will support, augment and in some cases extend mission range and scope..."

Comments  (0)


Is Healthcare IT Security on Life Support?

January 13, 2012 Added by:Rafal Los

As costs pile up from beaches, innovation suffers. Ask someone who runs a hospital network - the true cost of innovation slow-down can be counted in lives. Maybe I'm being a little dramatic, but I suspect this is closer to reality than we'd like to admit to ourselves...

Comments  (0)


How to Re-Awaken Your Inner Hacker

January 04, 2012 Added by:Rafal Los

Information security cannot be a population of sheep, zombies or whatever other metaphor we want to use - we must be the most innovative thinkers, the ones who truly do think different and always question everything. With that in mind - here are some things I recommend...

Comments  (1)


Autumn Spring: A Philosophical Look at the Internet

December 28, 2011 Added by:Richard Thieme

Internet pioneers such as J. C. R. Licklider, saw what would happen when we plugged computers into one another: We will live in a human-computer symbiosis, a coupling of symbol-manipulating networks that will be much greater than the sum of its parts...

Comments  (0)


Why Manufacturers Should Support Jailbreaking

December 27, 2011 Added by:Electronic Frontier Foundation

When security flaw was discovered when iPhone’s web browser opened PDF files, Apple was slow to patch it. Users who didn’t want to wait for the fix had a better way to protect themselves: jailbreak their phones to install an “unauthorized” patch created by an independent developer...

Comments  (0)

Page « < 1 - 2 - 3 > »