Gen Y Employees: Your Future--And Your Biggest Threat
Our excellent sister site Dark Reading has summarized three reports about a group representing the latest in in-house IT security threats: they don't know or don't care about IT security policies, they're heavy users of cutting-edge technologies, and they care more about securing their home PC than their work PC. They're your Gen Y employees, and they're your future.
Google Crowdsources YouTube Support
YouTube is looking for users willing to make a video to explain topics such as Editing my video, Customizing channels, and Transferring from camera to computer.
Crisis Survival Kit: 5 Resolutions For Managing IT In 2009
The second half of 2008 has already been brutal for business. The prospects for early 2009 aren't glowing, but now's the time for business owners to think hard about the strategy and decisions that will carry the company through next year.
Cell Phones As Wallets One Step Closer
The GSM Association called for most mainstream cell phones to have NFC technology, which paves the way for phones to be used as contactless payment devices.
Green Hills Software Integrity: A Secure OS At Last
Green Hills Software Integrity 178B operating system is the first, and only, certified Common Criteria Evaluation Assurance Level (EAL) 6+ operating system on the market. Green Hills Software uses Integrity as the basis for a secure PC operating system called Integrity PC and includes Padded Cell Virtualization, a secure hypervisor running within Integrity PC. Integrity Global Security LLC has been formed as a subsidiary of Green Hills Software to market Integrity PC. Integrity PC is provably se
CSI 2008: The Business Case For Governance, Risk, And Compliance
There are three legs of a table that, if weakened, put your organization at risk and, if a leg is removed, let the table fall to the ground. IT governance, risk, and compliance (GRC) is fundamentally a return to the basics of information security. Regardless of technology, you need to know what to protect, when it needs protecting, and why it needs protecting. Getting ahead of the game is more effective than catching up later.
CSI 2008: Brian Snow's Assurance And Controls
Brian Snow's keynote at CSI 2008 started with an amusing graphic of a guy pouring gas over his head while lighting a cigar. The message was we always take risks, even when we aren't aware of them. Snow learned a thing or two about risk while working at the NSA for 20 years, ending as technical director for information assurance. Information risks, he points out are, moving targets and information security programs need to be adaptable and w
CSI2008: Security Reconsidered
This year's CSI 2008 event promises to be every bit as interesting as ever. CSI tracks are broad, the topics deep, and the speakers top-notch. Once again I find myself wanting to see all of it (9 tracks!) but only one of me.
|