News
Commentary
Quick Hits
Quick Hits
Quick Hits
Commentary
Commentary
Commentary
Commentary
Commentary
News
News
News
News
Quick Hits
Commentary
This comment is waiting for review by our moderators.
In reply to: Pending Review
This comment is waiting for review by our moderators.
In reply to: Pending Review
I think the same, the intelligence sharing can really help some poor countries, so i support it.
In reply to: Social Media">Re: Comment: Social Media
The 'breach' (in its broadest sense) figures are climbmg inexorable despite all the talk and flannel os vendors and consultants. It is like fixng rust spots on a rust bucket car whre as soon as you fix one, another appears....
In reply to: Re:Breaches over Next 2 Years
Coincidentally, as per an old stat that's been floating around a few years now (from Gartner, I think? I don't quite remember) indicating that within two years of a major breach, a small business goes out of business.On...
In reply to: 2 years, and compliance
Most companies record the assets and liabilities and account for these on an annual basis. Desks, chairs, machinery, equipment and all things mobile and nonremovable are recorded as assets. It becomes part of the net...
In reply to: The value of YOUR data
Speaking as someone who works with data-privacy issues for a living, I think it's important and commendable how Jai breaks these factors down.For people like us who work with these developments, relatively...
In reply to: Taking data stewardship for granted
@Christian: Moreover, what often fails to be recognized here is that sometimes the ROI is the avoidance of even greater negative ROI.Which, technically, is a positive.Really, more executives need to know more about risk...
In reply to: Re: Reporting/communicating to whom?
While I understand Dr. T's comment about security and money, and to some extent agree, I also know from experience that I can never - repeat, never - walk into any manager's office without a cost/savings breakdown of some...
In reply to: Re: Reporting/communicating to whom?
@Dr.T: I'm not sure that's possible, first of all (for reasons not least of which including the inherent conflict of interest that the CIO's job has with the CISO's job), but why do you think that it should not matter?
In reply to: Re: Reporting/communicating to whom?
@Raymond: Extending these questions even further, then, what about the Chief Privacy Officer or similarly situated role/office? Also to the COO? To the CISO? to...?
In reply to: Re: Reporting/communicating to whom?
@Dr. T: Security is about money, though -- or, at least, about economic value. Ditto for security's exact opposite -- accessibility.It's all about risk management at the end of the day. Seems like something right up the...
In reply to: Re: Reporting/communicating to whom?
Latest Comment: This comment is waiting for review by our moderators.
Security Operations and IT Operations: Finding the Path to CollaborationA wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
[Strategic Security Report] Assessing Cybersecurity Risk
As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report delivers insight on how today's enterprises evaluate the risks they face. This report also offers a look at security professionals' concerns about a wide variety of threats, including cloud security, mobile security, and the Internet of Things.