Blog Posts Tagged with "Enterprise"

65c1700fde3e9a94cc060a7e3777287c

The Road To Identity Relationship Management

November 04, 2013 Added by:Simon Moffatt

The modern enterprise workforce, will contain contractors, freelancer and even consumers themselves. Bloggers, reviewers, supporters, promoters, content sharers and affiliates, whilst not on the company payroll, help drive revenue through messaging and interaction. If a platform exists where their identity can be harnessed, a new more agile go to market approach can be developed.

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Subtleties of Enterprise Security Vulnerability Management — at Scale

July 11, 2013 Added by:Rafal Los

Enterprises face some interesting challenges as they grow. Once you scale to any real size, tasks that seemed simple become unmanageable and difficult, even confused. One of those tasks is vulnerability management, and while it may sound simple and trivial, I assure you it is, indeed, not.

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

Deconstructing 'Defensible' - Too Many Assets, not Enough Resources

April 19, 2013 Added by:Rafal Los

In just about every organization (with little exception) there are more things to defend than there are resources to defend with. Remember playing the game of Risk, when you were a kid? Maybe you still have the game now... amazing how close to that board game your life in InfoSec is now, isn't it?

Comments  (0)

66aba1b1a2bccb57f2459a04e2e49b0e

Security; The non-commodity

March 21, 2013 Added by:Oliver Rochford

In an enterprise environment, a computer comes preloaded with Antivirus. For businesses, this is of course a good thing. It has sadly also had some unintended consequences – mainly to be found in the perception and expectations that customers and end-users have developed because of the commoditization of antivirus.

Comments  (2)

6ba13f7544750cd81809eb83d296112a

Roundtable: Opportunities for HR in Consumerization of IT

March 15, 2012 Added by:Kyle Lagunas

Providing access to all sorts of internal systems for both employees and managers can make for a more adaptable organization regardless of size. IT has struggled with this loss of gatekeeper control, but the sound fiscal results are changing the minds of the C-suite...

Comments  (0)

D15e0b682a84587af9af463961d00f22

e-Commerce Risks for Cyber Monday and the Holidays

November 28, 2011 Added by:John Nicholson

To deal with the potential volume, they can turn to cloud-based services to add capacity and prevent the site from crashing, but as we'll discuss below, the availability commitments made by many cloud services create their own risks...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Emerging Companies Can Delay SOX Compliance

October 24, 2011 Added by:Headlines

New companies with a market capitalization under USD 1 billion will now be able to opt-out of regulations within section 404 of the Sarbanes-Oxley (SOX) Act for the first ten years after going public. This option was previously available to companies under USD 75 million...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Get Your SOX Compliance On

October 12, 2011 Added by:Infosec Island Admin

SOX Compliance & Evolution to GRC Conference is a unique opportunity to review the required blend of compliance and risk-based strategies and methodologies necessary to meet federal mandates while delivering greater efficiency across their GRC footprint...

Comments  (0)

E973b16363b3de77b360563237df7e32

Maintaining Quality in Outsourcing Telco Services

September 30, 2011 Added by:Bozidar Spirovski

The issue with telco services is that quality is difficult to define because there are parameters that are difficult to track: sound quality, response of system to tone-dial menu selection of an IVR, intermittent interruptions of communications, and temporarily unavailable service...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

SOX Compliance and Evolution to GRC - Chicago

September 23, 2011 Added by:Infosec Island Admin

The SOX Compliance series is targeted at a focused group of senior level executives to maintain an intimate atmosphere for the delegates and speakers. Since it is not a vendor driven conference, the higher level focus allows the delegates to network with their industry peers and speakers...

Comments  (0)

3ac1b4d00e292a1a670a4df0e460892a

Companies Using Secure Protocols in an Insecure Manner

September 16, 2011 Added by:Cor Rosielle

I only looked at the Fortune 500 companies with knowledgeable IT and security staff, and with a board and directors who should care about security and have sufficient budget to get these basic things right. Let's hope the companies are as disappointed about these results as I was...

Comments  (8)

7fef78c47060974e0b8392e305f0daf0

SOX Compliance and Evolution to GRC Conference

September 14, 2011 Added by:Infosec Island Admin

While maintaining the focus on the continual optimization of the SOX program, 22nd edition conference will draw on the more recent challenges being faced by SOX professionals in light of the recent economic climate and new Dodd-Frank requirements...

Comments  (0)

34f0cf280cbc950bcb75cabd189b7a8d

Customize Your Flash Drive – Infosec Style

September 12, 2011 Added by:Kanguru Solutions

Every organization has different needs. What works for one may not work for another. Size, budget, personnel, and structure all play a factor in determining what an organization will do in terms of IT security. There generally is no “one size fits all” solution when it comes to Infosec...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

How to Engage Employees in Compliance

September 05, 2011 Added by:Thomas Fox

A compliance professional should see him or herself as a catalyst for problem solving. As a lawyer I understand that you are required to know law and compliance requirements. But remember - it is OK not to know everything. That is the whole point of collaboration...

Comments  (0)

0356a83ecb15c8e33b00560d7bebe47f

Nine Reasons Why You're Not Ready for DLP

August 31, 2011 Added by:Stephen Marchewitz

No matter what you are told, simply writing a check to a software vendor and installing some code will not prevent all data loss. Depending on the intricacies of the organization, the money that DLP solutions require may likely be better spent on other security initiates...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

End of the Annual Compliance Training Flea Dip

August 25, 2011 Added by:Thomas Fox

Compliance and ethics training should be integrated into more routine employee training rather than stand along compliance and ethics training. The more innovative component of Nortz’s suggestions revolves around employee involvement and follow up...

Comments  (0)

Page « < 1 - 2 - 3 > »