Checklist for a successful security assessment

.
  • Agregar a Technorati
  • Agregar a Del.icio.us
  • Agregar a DiggIt!
  • Agregar a Yahoo!
  • Agregar a Google
  • Agregar a Meneame
  • Agregar a Furl
  • Agregar a Reddit
  • Agregar a Magnolia
  • Agregar a Blinklist
  • Agregar a Blogmarks

Checklist for a successful security assessment


Checklist for a successful security assessment

Posted: 02 Jun 2011 07:12 AM PDT


A security assessment is a request to analyze the risk of an IT solution. The request is initiated by a CISO (Chief Security Officer) or ISO (Information Security Officer) within a corporation. It is used to make sure that security concerns are met before changes are made to the information technology infrastructure. There are foundation plans which evaluate the state of new applications or infrastructure. Or there are incremental plans that address changes to the foundation plan.

Lesson from SecurID breach: Don't trust your security vendor

Posted: 02 Jun 2011 05:56 AM PDT


What does a rash of attacks seemingly stemming from the RSA SecurID breach mean to most enterprises? That depends, experts say.

8 security considerations for IPv6 deployment

Posted: 01 Jun 2011 12:21 AM PDT


Now that we're out of IPv4 allocations, it's time to get serious about adopting the next generation of Internet Protocol, IPv6.

Virtualization, 10G Ethernet streamline Cisco user's data center

Posted: 01 Jun 2011 01:39 AM PDT


It is by no means the largest or most sophisticated Cisco network there is -- yet the infrastructure implemented by Transplace is nonetheless a great example of the target application for Cisco's data center switches.

Cisco: IP traffic to quadruple by 2015

Posted: 31 May 2011 11:34 PM PDT


Fueled by an explosion of network-connected devices, the total amount of global Internet traffic will quadruple by 2015 and reach 966 exabytes per year, according to an internal study conducted by Cisco.

10G top-of-rack switches to surge to $1B in sales this year

Posted: 31 May 2011 11:21 PM PDT


Even though sales of Layer 2/3 Ethernet switches declined 12% sequentially in the first quarter, sales of 10 Gigabit top-of-rack switches are expected to jump 51% to $1 billion this year, according to Dell'Oro Group.

Sony to restore Thursday all PlayStation Network services

Posted: 02 Jun 2011 09:55 AM PDT


Sony will fully restore PlayStation Network services on Thursday in all regions other than in Japan, Hong Kong, and South Korea, the company said.

Facebook video scam puts malware on Mac and Windows

Posted: 01 Jun 2011 04:02 AM PDT


Facebook seems unable to stop scammers from circulating malicious Web links that install fake antivirus software on victims' computers.

Google says phishers stole e-mail from US officials, others

Posted: 01 Jun 2011 02:08 AM PDT


Google has disrupted what it believes to be a targeted phishing campaign aimed at stealing e-mail from government officials, contractors and military personnel.

Cyberattacks fuel concerns about RSA SecurID breach

Posted: 01 Jun 2011 12:42 AM PDT


Recent attacks against two defense contractors are fueling concerns about how badly RSA's SecurID two-factor authentication technology was compromised in a breach reported in March.

Cybersecurity research consortium: New tech on the way

Posted: 01 Jun 2011 12:29 AM PDT


An 18-month-old cybersecurity consortium should soon yield new technologies, participants say.

Mac scareware gang evades Apple's new anti-malware defenses

Posted: 01 Jun 2011 12:09 AM PDT


The gang responsible for a month-long plague of fake Mac security software has already updated their "scareware" to evade defenses Apple put in place late Tuesday, a security company confirmed today.

Security still a concern for those considering cloud move

Posted: 31 May 2011 11:44 PM PDT


Security concerns continue to be a key issue for organizations using or considering cloud-based services.

DroidDream authors again pollute Android Market

Posted: 01 Jun 2011 06:35 AM PDT


Almost three dozen applications sporting a stripped down version of DroidDream have been identified in the Android Market.

Secure software brought to you by the acronym WRT

Posted: 01 Jun 2011 06:34 AM PDT


With breaches ever on the rise and software vulnerabilities at the heart of many security incidents, CSOonline decided to talk with noted software security expert Rafal Los. Los, currently security evangelist with Hewlett-Packard Software, is an industry veteran who has worked as a security consultant and even as information security officer in the Fortune 100. We wanted to get his thoughts on what organizations can do -- today -- to improve the security of the applications they develop.

Mobile App Security: 5 Ways to Protect Your Smartphone

Posted: 01 Jun 2011 06:30 AM PDT


Wave your smartphone; buy a latte. Sounds great, doesn't it? But before running off to participate in Silicon Valley's next new thing, you might want to think about a scary downside to mobile commerce: the vulnerability of smartphones to hackers.

0 comments:

Post a Comment