Tags » Information Security

3 Reasons to Implementing Information Security System in Your Business

The importance of the protection of your Home will never be exaggerated. Without it, your residence becomes additional prone to burglars and unwanted guests. During this trendy, technological world, however, there is a new style of felony or burglary that is virtual in nature: illegal data access. 415 more words


Personal message to the information security awareness community

The message


So here we are, in this world. Trying to survive, trying to understand, trying to remember who we are, amidst constant drifting changes… and then one day, when we arrive to work someone presents us with a new requirement that says “you must learn this! 481 more words


NOT another Heartbleed Post

But rather a heartfelt thank you and cry for your support! In exchange for not writing yet another piece on Heartbleed (enough coverage by me… 340 more words


AskGAOLive: IRS Securing Financial and Taxpayer Data

What happens to all the personal data you send to IRS with your tax return? Join us for a chat about IRS controls to secure your data from threats, today at 2:00pm ET. 109 more words

Government Accountability Office

How do you make Information Security interesting?

I recently posted this question in a security group on LinkedIn. I’ve had one response so far (it’s early days), which was very good. It advised on culture change and rewarding people for doing the right thing. 152 more words

Risk Analysis

Information Security vs Software Developers: Bridging the Gap

One of the biggest challenges in information security is application security. For example, Microsoft’s Security Intelligence Report estimates that 80% of software security vulnerabilities are in applications and not operating systems or browsers. 822 more words

Information Security


In the world of Information Security, Confidentiality is defined by ISACA as:

Preserving authorized restrictions on access and disclosure, including means for protecting privacy and proprietary information…

32 more words
Information Security