Tags » Information Security

NOT another Heartbleed Post

But rather a heartfelt thank you and cry for your support! In exchange for not writing yet another piece on Heartbleed (enough coverage by me… 340 more words

Commentary

AskGAOLive: IRS Securing Financial and Taxpayer Data

What happens to all the personal data you send to IRS with your tax return? Join us for a chat about IRS controls to secure your data from threats, today at 2:00pm ET. 109 more words

Government Accountability Office

How do you make Information Security interesting?

I recently posted this question in a security group on LinkedIn. I’ve had one response so far (it’s early days), which was very good. It advised on culture change and rewarding people for doing the right thing. 152 more words

Risk Analysis

Information Security vs Software Developers: Bridging the Gap

One of the biggest challenges in information security is application security. For example, Microsoft’s Security Intelligence Report estimates that 80% of software security vulnerabilities are in applications and not operating systems or browsers. 822 more words

Information Security

In the world of Information Security, Confidentiality is defined by ISACA as:

Preserving authorized restrictions on access and disclosure, including means for protecting privacy and proprietary information…

32 more words
Information Security

In the world of Information Security, Integrity is defined by ISACA as:

Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity…

35 more words
Information Security

In the world of Information Security, Availability is defined by ISACA as:

Ensuring timely and reliable access to and use of information

Shon Harris in CISSP All-In-One Exam Guide, 6th Edition defines…

17 more words
Information Security