http://www.go-trust.com/demo/
this could pretty much gurantee that platform with SD slot is the future.. which is not Iphone, and surely Android.
a blog about how to better improve Enterprise Security via Best practice in Policy / Compliance / Control
Monday, July 9, 2012
Friday, June 8, 2012
Data Breach tracker
don't get listed:
http://www.privacyrights.org/data-breach
Thursday, May 17, 2012
Wednesday, May 9, 2012
upcoming EU Data Protection update
here is a head start as the draft is ready already:
- merging of COPPA law from US.
- inclusive of non-EU company who may not have a entity in Europe to require a Data Protection Officer.
- opt-in instead of opt-out for all processing of data. (this could change UI).
- require of notification of beach in 24 hours
- impose penalties of up to 2 % of a company’s worldwide turnover in case of severe data protection breaches.
Thursday, May 3, 2012
CISO and IT are starting to merge into one org.
http://www.securityweek.com/ibm-study-ciso-role-evolving-more-intense-ever
This is a natural progression as security becomes more involved in day to day operations as well as production. I think we will see numerous title changes and org restructuring. Director of IT Security, Security Admins vs. IT admins etc.
This is a natural progression as security becomes more involved in day to day operations as well as production. I think we will see numerous title changes and org restructuring. Director of IT Security, Security Admins vs. IT admins etc.
Tuesday, May 1, 2012
SQL Firewall/Scrubber/Cacher
Firewall (user level permission), SQL masking (allow a interface to mask the data for outbound), Caching.... www.greensql.com
Kanban for IT
most mature IT Ops already have ticketing system, this is a nice Japanese efficiency spin to maximize your work force: http://www.leankanbanuniversity.com/kanban-it-operationsdevops
HP / Verizon Security for 2012
HP and Verizon Security Report for 2012:
http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf?djinn=701U0000000EHE8&utm_medium=blog&utm_camp=twblog
http://www.hpenterprisesecurity.com/collateral/report/2011FullYearCyberSecurityRisksReport.pdf?elq=7973a84d22f34d699346ec57261f9db9
http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf?djinn=701U0000000EHE8&utm_medium=blog&utm_camp=twblog
http://www.hpenterprisesecurity.com/collateral/report/2011FullYearCyberSecurityRisksReport.pdf?elq=7973a84d22f34d699346ec57261f9db9
Subscribe to:
Posts (Atom)