article thumbnail

More Questions than Answers from Data Breach Report

CTOvision

Major breaches in the last year  at large companies like Target and eBay  have made information security discussions more worrying and more widespread, albeit still not universally understood. Big Data Cyber Security Computer security Crime Cybercrime Cybersecurity Data Breaech hackers Information security'

Report 268
article thumbnail

IDG Contributor Network: The devil is in the details: The importance of tight processes to strong information security

ComputerWorld IT Management

Have you ever pulled a policy or procedure down from the internet, changed a few things and called it your own? Most of us have done this from time to time, and building on the work of another (assuming of course that it is not copyrighted) is a good way to start, as long as you make the proper adjustments to meet your specific needs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How Connected-Cars Could Cost You Your Privacy

CTOvision

The connected car is a car that is increasingly connected to the Internet and, potentially, to the cars around it. At an intermediate scale, connected cars are just cars like the ones we have today that make much greater use of the Internet. By definition connected cars are Internet-facing.

Internet 150
article thumbnail

Symantec Government Symposium 11 March 2014 at the Renaissance Hotel Washington DC

CTOvision

Of course you always need to evaluate the agenda and it pays to be going to an event that has a reputation for advancing key issues. Chuck McGann , Corporate Information Security Officer, USPS. Richard Naylor , Deputy Director for CyberSecurity Operations, Defense Security Service, DOD. – 3:40 p.m. Closing Remarks.

Symantec 261
article thumbnail

Importance of Cybersecurity Profession Highlights SecureWorld Chicago

SecureWorld News

Well, information security, cybersecurity happens to be a critical part of the business, being able to achieve strategic objectives. Buerger recently joined Kraft Heinz as its Business Information Security Officer after serving as CISO at a smaller company. Cedric Leighton, CNN Military Analyst; U.S. Air Force (Ret.);

article thumbnail

How Not To Be Paralyzed By NSA Revelations

CTOvision

As I explained to my students today, if they must connect to an unsecure wifi network at a coffee shop or elsewhere, they can improve their security by using the university’s VPN or by using their own mobile hotspot, if they have one. Of course, we now know that NSA has worked to compromise VPN encryption, as well as 4G/LTE.

Security 212
article thumbnail

Disruption Doesn’t Make an Appointment. A Guide for Handling the Unwelcome Knock.

CIO Business Intelligence

Climate, control blackouts, political occasions, and of course, new to the list, pandemics. Lois is a Certified Chief Security Officer and a Certified Information Security Manager. Here are some practical immediate responses. Business disturbances can affect organizations of any size in any area.