information security

  • Twenty free and effective infosec tools

    Posted January 12, 2013 - 9:00 am

    We asked readers to name the free tools they find most useful in their daily work as infosec practitioners. Here are 20 that stand out.
  • Obama ID protection plan may be best alternative to data theft

    Posted May 4, 2011 - 2:03 pm

    A federal program outlining how to store identity data securely and regulating the private companies that will do it may be the best option to add some protection online.
  • For Sale: Used computer with secret NASA Space Shuttle data

    Posted December 8, 2010 - 10:58 am

    Forget WikiLeaks, tossing hard drives into publicly accessible dumpsters, selling old computers with no disk wipe is a much more efficient way to release secret information.
  • Why your information security stinks & what to do

    Posted April 15, 2010 - 2:55 pm

    Former cybersecurity czar Amit Yoran on why information security is in a "death spiral" -- and what you can do.
  • Review

    Book Review: The Art of Deception: Controlling the Human Element of Security

    Posted September 2, 2009 - 9:56 am

    If I had only one thing to say about The Art of Deception, it would be that it convinced me that even technologically savvy people fall prey to the guile of practiced social engineers (formerly known as a "con artists" to most of us).
  • Good VoIP Deployment Guidelines (Do Not Exist?)

    Posted October 23, 2008 - 8:27 am

    I get questions regarding VoIP deployment all the time. Sometimes it is someone looking for simple and cheap Enterprise VoIP, who are unsure if VoIP can be deployed securely with those two parameters in the equation. More often it is the security aware people who are willing to invest almost anything to make it work, but cannot. As always, there is no silver bullet solution for either. If you look at my past opinions, I keep changing my mind between cheap that works, and secure that doesn't. What do you think? Which way should we go in VoIP?
  • The state of information security

    Posted October 23, 2008 - 4:12 am

    CSO’s annual “Global State of Information Security” survey brings to light a few of the failures of how people approach information security, and in particular, focuses on the current economic crisis and the impact that it is having on security technology.
  • How the information-centric security approach can protect sensitive company information

    Posted September 30, 2008 - 11:53 am

    How the DRM approach further protects company data?

  • VARs have a big opportunity in the midmarket, according to study

    Posted September 5, 2008 - 10:16 am

    According to a study conducted by Echo Research for Arrow Enterprise Computing Solutions, VARs targeting the mid market "need to improve before they can take full advantage of the market opportunity.

    The study showed that 70 percent of executives said their consultants performed up to expectation, but only 10 percent said their consultants exceeded expectations.
  • Greatest Challenge in VoIP Security

    Posted July 16, 2008 - 3:08 am

    The greatest challenge in VoIP security is that there are very few good example case studies available. There are some very good VoIP deployments. But try to find a white-paper with someone disclosing all the their success stories in building a perfect VoIP network. No luck! Unfortunately much of that data is hidden in confidential documents. Still, I have really loved to see VoIP security emerge and evolve from being a hindrance in VoIP deployment, into a key marketing value. Finally some of those success stories will get a chance to see daylight.
  • Failures of Information Security: Observing the World and Asking Why

    Posted July 8, 2008 - 12:30 pm

    Information security matters; it is important. It matters to companies and their shareholders. It is of great importance to the general public, whose personal data is stored by the companies and organizations with which they interact (and by some with which they don’t). We all hope our private files and email correspondence remain secure. The security industry and security professionals are the guardians of that personal information. They seek to frustrate criminals by employing standard ways of working and by deploying security technologies. Unfortunately, these efforts have not always been successful. This chapter delves into some of the most apparent failures of information security.
Join us:






Join today!

See more content
Ask a Question