Remove Examples Remove Fractional CTO Remove Information Security Remove Malware
article thumbnail

InfoSec Policies and Standards: Some strategic context for those just diving into this world

CTOvision

Organizations are giving more priority to development of information security policies, as protecting their assets is one of the prominent things that needs to be considered. So an organization makes different strategies in implementing a security policy successfully. Get Management Support. Write Policies. Implement policies.

Policies 268
article thumbnail

The Sony Hack in Context

CTOvision

In sum, Sony’s losses are neither surprising nor unprecedented, merely a salient example of corporate vulnerability and the fact we are continuing to erect our massive information economy on sand. National Security Risks. The US military, by design, is more dependent on information technology than any potential adversary.

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

That, of course, was not all, but it is an example of how someone -- anyone on the internet -- can take a photo or blog post or Yelp review from social media, or some other seemingly random open source item and tie it back to a crime. Let's analyze malware. Daniel provides an example. Let's analyze stuff. Let's analyze exploits.