Tuesday, December 13th, 2011
Finally, I want to highlight Steve Vinsik and his post on Cyber Crime: How to Prevent an Attack and Mitigate Damage. Again, if you remember June time frame, and were following business news, there was a RSA SecureID hack. While there was hype about the incident, Steve focused on immediate points enterprises should focus on [...]
Thursday, September 22nd, 2011
Tom Kellerman speaks about the new security paradigm and the impact of mobile devices on cybersecurity.
Thursday, September 15th, 2011
Why current security methods are failing? Why might your organization be ripe for an attack? Discussed here are the remaining three of six principal threats IT faces from hackers.
Tuesday, September 13th, 2011
Identity threats are becoming more sophisticated and specific in their aims. Identity theft targets people—any person who happens to make the mistake of clicking the wrong link or launching the wrong document. The threats are evolving. So too must the security model.
Tuesday, September 6th, 2011
Hackers are a problem for nearly all organizations, because most still rely on traditional perimeter security—VPNs, firewalls, IDSes, IPSes—things that protect the network’s borders. These approaches were once all you needed to prevent most attacks. But perimeter solutions aren’t holding up anymore. Hackers are getting past them with ease. Easy to use hacking tools are readily available, allowing anyone with a PC and a motive to penetrate networks. If you can spell, you can use these tools to compromise a network. And once you’re in, you often have access to everything.
Monday, June 6th, 2011
It’s one thing to have a social media policy. It’s another thing to make sure employees are familiar with it.
Wednesday, January 26th, 2011
Headlines that are catching the eyes of IT professionals.
Tuesday, December 28th, 2010
The growth of the internet – and the commercial opportunities it presents – is bringing with it an explosion in software application development.