Blog Posts Tagged with "Communication"
The Private Communication Encryption Conundrum
July 08, 2013 Added by:Keith Mendoza
Demanding that communication providers offer encryption of private communication is great; however, there are major hurdles that needs to be overcome from a technological and usability standpoint.
Comments (0)
Social Engineering: What the Heck Was I Doing? Part 1
September 26, 2012 Added by:Will Tarkington
The method I used for this particular tactic was to monitor the conversational rhythm. Then inject into it and take it over allowing me to guide the conversation. The skill set that allows you to walk into a conversation and take it over can’t be understated...
Comments (0)
How Do You Change an Unhealthy Compliance Culture?
August 29, 2012 Added by:Thomas Fox
The best way to effect culture “is to combine strong leadership with the existing internal elements of a healthy corporate culture... while it may take as long to create a good culture as it does to establish a good reputation, a strong set of values is usually harder to destroy unless the company is itself dismantled..."
Comments (0)
Silly Putty and Compliance: Remember It’s Not Always About You
August 08, 2012 Added by:Thomas Fox
This is not the problem where the legal department or compliance department is viewed as the Land of No, inhabited by only Dr. No. It is, instead, the perception that legal or compliance simply institutes requirements without even talking to the people they affect the most, the business unit employees...
Comments (1)
Huawei Boasts of Remote Data Interception Capabilities
June 19, 2012 Added by:Headlines
“Embedding these capabilities in any network means…(that) they can then intercept and control those networks... I am so worried about Chinese cyber warfare threats, their abilities to monitor and remotely shut down international communications networks, including critical infrastructure networks"...
Comments (1)
Communication is King in E-Discovery Matters
May 10, 2012 Added by:Bill Gerneglia
A common vocabulary is certainly emerging making dialog between counsel and technologists productive and effective. However, equally important is that lawyers engage their client’s technology team in dialog on e-discovery issues because when counsel fails, the fall out can be costly...
Comments (0)
Helpdesk to the Boardroom
April 16, 2012 Added by:Daniel Blander
As security professionals, we eagerly hone our skills and immerse ourselves in the latest research. Yet too many of us feel that we are marginalized, and become frustrated at our lack of professional advancement. What could be the problem and how can we overcome it?
Comments (0)
NSA Denies Warrantless Wiretaps Despite Evidence
March 27, 2012 Added by:Electronic Frontier Foundation
The NSA claims it only has access to emails and phone calls of non-U.S. citizens overseas, but many previous reports that the program targets US based email records. In the 11 years since 9/11, Binney estimates 15 to 20 trillion transactions have been collected and stored by the NSA...
Comments (0)
Communication is the Key to Security
January 19, 2011 Added by:Mike Meikle
There is a sea change taking place in information technology however. The consumerization of the enterprise by the infiltration of mass market technology has lowered the drawbridge and allowed many unauthorized devices and services to stream in and out of the corporate network...
Comments (0)
- A Call to Structure
- What CEOs Need to Know About the Future of Cybersecurity
- Who’s Responsible for Your Cyber-Security?
- CERT/CC Warns of Vulnerabilities in Marvell Avastar Wireless SoCs
- Mozilla Concerned of Facebook’s Lack of Transparency
- OWASP: What Are the Top 10 Threats and Why Does It Matter?
- Magento Patches Command Execution, Local File Read Flaws
- The Biggest Security Hurdles in Your Business, and How to Overcome Them
- Four Technologies that will Increase Cybersecurity Risk in 2019
- Strategies for Winning the Application Security Vulnerability Arms Race