Items Tagged with "Information Technology"
January 02, 2012 Added by:Bill Gerneglia
"Instead of requesting that a third-party security vendor conduct testing on the enterprise's behalf, the enterprise will be satisfied by a cloud provider's certificate stating that a reputable third-party security vendor has already tested its applications."
December 29, 2011
ENISA seeks to identify the most suitable technology and platform to provide secure channels to improve communications with CERTs and other stakeholders. Secure transportation of information assures some combination of confidentiality, integrity and authenticity of the data...
December 28, 2011 Added by:Richard Thieme
Internet pioneers such as J. C. R. Licklider, saw what would happen when we plugged computers into one another: We will live in a human-computer symbiosis, a coupling of symbol-manipulating networks that will be much greater than the sum of its parts...
December 25, 2011 Added by:Bill Gerneglia
CIOs and senior IT business decision makers must maintain a focus on specific trends that will effect the industries in which they compete. You should already be thinking about how technology is going to help shape your business far into the future. CIOs have to be forward-thinking...
December 13, 2011
Our society has become irreversibly dependent on Information and Communication Technologies (ICTs). Unfortunately, the adoption of them has been accompanied by the development of a new set of cyber threats which are developing in ever more rapid, sophisticated and sinister ways...
November 08, 2011 Added by:Joel Harding
Information is power. Those who control information understand they wield a very powerful tool, they share information with only those they decide need to see that information. One who controls information within an organization can manipulate others, whether consciously or unconsciously...
November 03, 2011 Added by:Richard Thieme
The task of counterintelligence is to figure out what the other side is doing and how they are deceiving us. CI is predicated on double deceiving and triple deceiving the other side into believing fictions nested within fictions, always leavened with some facts, just enough to seem real...
November 02, 2011 Added by:Infosec Island Admin
The snow storm in October made me once again ponder my own readiness with regard to how to handle infrastructure failures. These same events have shown me just how clueless all too many people are about how to survive when their infrastructure goes down for any extended period of time...
October 27, 2011 Added by:Dan Dieterle
There is a disconnect between management and IT. Sometimes management doesn’t fully understand what the IT department is doing. Veteran computer personal are being removed from companies – “due to cutbacks”, only to be replaced shortly thereafter by inexperienced or even temporary workers...
October 21, 2011 Added by:Robert Siciliano
According to Consumer Reports, malware destroyed 1.3 million personal computers and cost consumers $2.3 billion in the last year. With the increased popularity of tablets, smartphones, and Macs, threats are becoming both more common and more complex for non-PC devices...
October 16, 2011 Added by:Bill Gerneglia
The demand for certain IT skills come and go with the economy. Certain skills are always in demand and others to a lesser degree. As an IT worker are you earning what you are worth? As an IT manager are you paying too much or too little to your IT staff?
October 14, 2011 Added by:Headlines
The Electronic Communications Privacy Act (ECPA) - signed when mobile phones were the size of bricks and the World Wide Web didn't exist – is woefully outdated, putting Americans' privacy at risk. Sens. Wyden and Kirk jointly call for updating U.S. privacy law to keep pace with technology...
October 13, 2011 Added by:Rafal Los
In the systems management world, it's about performance, deployment consistency, and uptime - metrics that can be quantified. This pattern repeats for applications and critical systems, and just about every other component of information technology - except, it seems, Information Security...
October 12, 2011 Added by:Simon Heron
The trouble is that technology is just one element of the solution. There is little doubt that while DLP software and devices can help, there is no single solution that can encompass all aspects of DLP, as different types of data have different threats and hence need different controls...
October 11, 2011 Added by:Infosec Island Admin
Anonymous’ use of technology comes naturally, as they formed online. It is with the growth of connectivity that the movement went viral. Some may say it was the targeting. I say the targeting was always there, but those who were feeling the miasma weren’t able to express it in normal ways...
October 11, 2011 Added by:Robert Siciliano
The cloud will encourage the development of identification technologies designed to authenticate individuals online and via mobile. The sheer connectedness facilitated by the cloud and our complimentary devices will ultimately allow for a more seamless and secure digital life...