Blog Posts Tagged with "Management"


Surviving the Annual Holiday Production Freeze

December 19, 2010 Added by:Rafal Los

Testing is often the difference between "we thought we were safe" and "we were safe" this holiday season. With potentially billions of dollars being spent online this holiday season - can you afford to leave it to chance?

Comments  (1)


Vivek Kundra's 25 Point IT Management Reform Program

December 15, 2010 Added by:Kevin L. Jackson

The shift to “light technologies,” that is, cloud services, which can be deployed rapidly, and shared solutions will result in substantial cost savings, allowing agencies to optimize spending, and allowing agencies to reinvest in their most critical mission needs...

Comments  (0)


Security Strategy: From Requirements to Reality

December 13, 2010 Added by:Ben Rothke

Without a deeply embedded structured approach to security systems design, Anderson argued that we find ourselves in the situation we are in today, with applications and operating systems full of bugs, vulnerabilities and other serious security flaws...

Comments  (0)


Five Important Fraud Investigation Interview Tips

December 03, 2010 Added by:Thomas Fox

A successful investigation interview isn’t just a question and answer period. Asking good questions is just a small piece of a very big puzzle. To get the most out of your fraud investigation interviews, remember these 5 important steps...

Comments  (0)


Enterprise Security: Keeping Up With the Joneses

November 17, 2010 Added by:Javvad Malik

No company wants to be that company with lame security which continually loses data, gets hacked and fined by regulators. But then neither does any company really have unlimited budget to implement the total number of security controls they need. They simply keep up with the Joneses...

Comments  (0)


Social Media, Infosec and the War on Drugs

November 08, 2010 Added by:Javvad Malik

More and more companies are finding their employee’s are addicted to the latest drug. A drug that is freely available and most addicts need to take several times a day. It’s the drug of social media.But what does this have to do with information security? Perhaps a bit more than you thought...

Comments  (0)


Will A Security Conference Help Your Company?

November 04, 2010 Added by:Lee Munson

Why send your IT staff to a conference? Security conferences are a place where both white and black hat hackers come out to show what they have discovered over the past year. The one thing that a hacker cares about more than money in this world is respect from his peers...

Comments  (0)


Five Ways to Create High Quality Security Policies

November 03, 2010 Added by:Robb Reck

Security policies are the foundation of an enterprise information security program. Without a solid foundation in place you simply cannot build a sturdy long-lasting structure; be it a building or a security program. Here are five things that can help you ensure your foundation is strong...

Comments  (0)


Business Continuity Implementation Webinar

November 01, 2010 Added by:Dejan Kosutic

This free one-hour training is designed for organizations that plan to implement BS 25999-2. This session will explain all the steps in business continuity implementation according to BS 25999-2 standard, and provide tips on how to proceed with this complex task...

Comments  (0)


CEOs and CIOs: Partnering for Success

October 07, 2010 Added by:Rahul Neel Mani

A new generation of CEOs — not necessarily young but innovative —have embraced CIOs as strategic business peers. Charles Cadell, CEO, Lowe Lintas India is certainly one of them. In an interview with Ashwani Mishra, Cadell shares his thoughts on the role and expectations from his CIO...

Comments  (0)


On Security and Motivation

October 04, 2010 Added by:Javvad Malik

There probably aren’t many companies who practice good security just for the sake of security. Security is driven by other objectives such as trying to impress another company so as to win business, because the regulators told them they had to, or because a rival company had just been breached...

Comments  (1)


End of An Era: HP Acquires ArcSight

September 24, 2010 Added by:Anton Chuvakin

The last independent software SIEM worth buying was acquired. The biggest SIEM game winner ArcSight was acquired by HP for about $1.5b. As people are already calling me en masse to comment, here is a post with a random sampling of conclusions, predictions and lessons learned...

Comments  (0)


Why CIOs Should Know the Way

September 17, 2010 Added by:Bill Gerneglia

Executives at every level have to endure an annual review and answer two core questions: What have you done to earn your keep and what are you going to do in the near future, especially since - in the case of CIOs - your job of ensuring operational excellence in IT has gone by the boards?

Comments  (0)


E-Discovery: Other Shoe Drops in Adams v. Dell

August 25, 2010 Added by:David Navetta

In one of the most watched and controversial electronic discovery cases from 2009, the federal court in Utah held that the defendant Asus Computer International had violated their duty to keep certain electronic and paper documents relevant to a federal action for alleged patent infringement...

Comments  (0)


Why Infosec Languishes, Part II

October 28, 2009 Added by:Jim Anderson

Although external forces including economic downturn and market specific slowdowns do have their impact, these external forces alone often cannot explain why information security makes so little progress.   This phenomenon is often true even in situations where senior infosec leadership is experienced, holds multiple certifications, and otherwise commands an excellent grasp of the multip...

Comments  (0)


Why Infosec Languishes, Part 1

October 05, 2009 Added by:Jim Anderson

This subject has been simmering for a long time but the events of the unfolding economic crisis and so many colleagues and acquaintances in the industry who have suffered substantially in their efforts to advance information security within their organizations have prompted me to organize my thoughts in this area.

Comments  (1)

Page « < 4 - 5 - 6 - 7 - 8 > »