G7 sets financial sector cyber defence guidelines as attacks grow

Computer Weekly

G7 countries have agreed cyber security guidelines in response to concerns about the safety of interconnected global financial systems that are increasingly coming under attack, according to Symantec

5 Essential Guidelines for Secure Online Shopping

IT Toolbox

The internet has become an integral part of our lives today. It has significantly changed our lifestyle by making it easy to it easy to search and find things online from the comfort of our homes

Trending Sources

Government announces digital apprenticeship service as part of apprenticeship levy guidelines

Computer Weekly

The government has released guidelines for the upcoming apprenticeship levy, including how businesses can access funds to train apprentices

U.S. Department of Defense sets its cloud security guidelines

Cloud Musings

By Jodi Kohut Those watching federal cloud security in the defense space were pleased to learn the Defense DOD Cloud Computing Security Requirements Guide (v1) (SRG) last month.

Four Common Password Practices You Might Want To Reconsider

CTOvision

Every few years, the National Institute of Standards and Technology revises its Digital Identity Guidelines, which include password best practices. The revisions are greeted with consternation by some because the guidance can run counter to long-cherished beliefs about what constitutes a good password and a good authentication system. NIST takes into consideration both the theoretical […]. CTO Cyber Security News

Many UK local councils still unprepared for GDPR, ICO survey shows

Computer Weekly

The ICO fines the Norfolk Council as it publishes GDPR guidelines for local councils after a survey revealed not all were up to speed in preparations to comply with the new data protection law

Putting Pen to Paper – Four Essential Factors to Calculating TCO on UPS Equipment

Data Center Knowledge

Learn how to make your UPS - with up to a 20-year lifespan - as efficient as cost-effective as possible by following four guidelines. Read More. Industry Perspectives

Why most of what we know about passwords is wrong, and how businesses should respond

Tech Republic Security

Bill Burr, who wrote the guidelines for modern password standards, claims that he gave the wrong advice on how people should go about creating passwords

Government Clouds: What is a FedRAMP?

Data Center Knowledge

Actually, the guidelines can help everyone because the FedRAMP. What is FedRAMP? It''s a secure government cloud that meets specific requirements.

Email Etiquette

IT Toolbox

My past experience tells me that these are guidelines on how to compose, respond and basically how to use email as a communication tool. What is email etiquette? Another question is should this be taught at some point and time to everyone

Vendors approve of NIST password draft

Network World

A recently released draft of the National Institute of Standards and Technology’s (NIST's) digital identity guidelines has met with approval by vendors. The draft guidelines revise password security recommendations and altering many of the standards and best practices security professionals use when forming policies for their companies. NIST said this guideline was suggested because passwords should be changed when a user wants to change it or if there is indication of breach.

ERP and the Adoption of Lean Production

IT Toolbox

Information technology is rapidly changing the production guidelines mapped out by decades of mass production. With the emergence of ERP, resource management and all assignments related to project management invariably fall under the purview of IT departments. This often creates a chasm between the actual requirements of the shop floor and IT department, resulting in waste of both time and resources.

Building a More Effective and Successful ERP Team

IT Toolbox

While preparing to assemble your team, keep these five guidelines in mind. Building a more effective and successful enterprise resource planning (ERP) team is more complicated than asking friends co-workers or seeing who’s available. To ensure project success, you must create a healthy, productive structure while assembling a group of people who can work together well. Common

Putting Together Your LAN Troubleshooting Toolkit

IT Toolbox

Here are some guidelines After seeing this smorgasbord of equipment available for helping you to test and troubleshoot your network, the next logical question is, "Which tools should I purchase for my network?"

Open Group Publishes Guidelines on Cloud Computing ROI

Cloud Musings

Open Group Publishes Guidelines on Cloud Computing ROI. Open Group Publishes Guidelines on Cloud Computing. Cloud Musings by Kevin L. Jackson. Personal comments and insight on cloud computing related technologies and their use in the public sector to support net-centric operations. Pages. Cloud Musings on Forbes. NJVC Cloud Computing. GovCloud Daily. GovCloud Presentations. GovCloud on Facebook. Get "Cloud Musings" by RSS. Posts. Posts. Comments. Comments. Thursday, April 29, 2010.

Be pragmatic, not dogmatic

Eric D. Brown

The most successful project managers out there are those that know when to follow guidelines and when to deviate from said guidelines.

Frame Relay Physical Layer Options and Frame Formats

IT Toolbox

In addition to these guidelines, the UNI IA acknowledges that other interfaces, such as ISDN, may be used as appropriate. For example, MCI currently offers frame relay as a switched digital service at 56/64 Kpbs, and also as a fractional T1 service, Nx56 or Nx64 Kpbs

IDG Contributor Network: IoT security principles from Homeland Security

Network World

Department of Homeland Security (DHS) recently published guidelines to “provide a strategic focus on security and enhance the trust framework that underpins the IoT ecosystem.” Power grids were bombed in World War II to cripple industrial output. Today, attacks against Internet of Things (IoT) infrastructure causes even broader disruptions—without bombs. The danger is real. The U.S.

8 steps to regaining control over shadow IT

Network World

These services act as extensions of the corporation but are steered entirely by groups that lack the knowledge or process to ensure they follow necessary guidelines, introducing security, compliance, and brand risk throughout the enterprise.

Congress just dismantled FCC rules protecting web browsing history: What it means

Tech Republic Security

Republicans in Congress just voted to strip away guidelines protecting web browsing data for consumers, in a landmark victory for ISPs including AT&T, Verizon, and Comcast

Fed Tech Roundup August 3

CTOvision

DISA updates draft cloud security guidelines - GCN.com. Help Us Add Resources to the Updated Mobile User Experience Guidelines! The following are some of the hot topics in the federal technology ecosystem (from FedTechTicker.com and TopTechTicker.com ): Fed Tech Ticker. The Technical Limitations of Lloyd’s Cyber Report on the Insurance Implications of Cyberattack on the US Grid. Banks And Insurance Companies Aware Of Cyber Risks: Opportunities Remain To Become More Resilient.

30 ways to improve IoT privacy

Network World

A demonstration of this new aspect of privacy and compliance is the Privacy Guidelines for Internet of Things: Cheat Sheet, Technical Report (pdf) by Charith Perera, researcher at the Newcastle University in the U.K. Much work still must be done before the industrial and municipal Internet of Things (IoT) becomes widely adopted outside of the circle of innovators.

Why You Need to Rethink Your IT Operating Model

CEB IT

Data Strategy Over Ownership: Coherent strategy and guidelines around data allow for rapid exploitation by distributed teams. The current wave of digitization disrupting the world’s companies is broader than past efforts.

Social Media Checkup: Healthcare Industry Growing Stronger

CIO Dashboard

Now that the FDA guidelines for social media usage are starting to shape-up, it is expected that medical device and pharma companies will begin to more actively use this platform to influence, educate, and empower consumers. Guest post by Adam Roumm.

Corporate IT: How to Get the Most From an IT Roadmap

CEB IT

Following three simple guidelines can improve communication across IT. For over 50 years the advertising industry has proved that images are a far more effective way to get a message across that using words alone.

Government Cloud Achilles Heel: The Network

Cloud Musings

They also need to evaluate the numerous permutations of business function, data user role, location of access, legal or regulatory guidelines and user devices. Cloud computing is rewriting the books on information technology (IT) but inter-cloud networking remains a key operational issue.

IT Project Management: The PMO’s Role in Agile Organizations

CEB IT

Digitization has become one of the most important strategic priorities for thousands of companies across the past few years and so, without doubt, is now the most important priority on many CIOs’ desks.

IBM Watson/ XPrize open $5 million AI competition for world-changing applications

Network World

IBM and the XPrize organization have opened registration and set guidelines to competing for a $5 million purse to those interested in building advanced AI-based applications that could address the world’s biggest issues – everything from clean water to better energy resources.

U.S.-Japan Rebalancing

CTOvision

The United States and Japan just released their Interim Report on the Revision of the Guidelines for U.S. Japan Defense Cooperation. Available here: [link] Anyone who works U.S.-Japan Japan interoperability issues (from policy to technology) will be interested in the language contained in the report, which is basically an action item from the last U.S. Japan Security Consultative Committee (SCC) (aka: 2+. To read more please log in. Login.

Cloud Computing Forensics Readiness

Cloud Musings

The responsibility of any external party should be determined in advance and made clear relevant policies, guidelines and agreements. Photo credit: Shuterstock In today’s globally connected world, data security breaches are bound to occur.

Fed Tech Roundup September 4

CTOvision

New Guidelines Require Warrants For Federal Surveillance of Cellphones - Yahoo Tech. The following are some of the hot topics in the federal technology ecosystem (from FedTechTicker.com and TopTechTicker.com ): Fed Tech Ticker. Mitre to Support Auburn University’s Drone Pilot Training Program. Feds Will Need Warrant to Use Cellphone Scanning Technology Known as 'Stingrays' - ABC News. No Organization Can Defend Themselves By Themselves Anymore.

Fed Tech Roundup September 11

CTOvision

States rush to regulate drones ahead of federal guidelines - GCN.com. The following are some of the hot topics in the federal technology ecosystem (from FedTechTicker.com and TopTechTicker.com ): Fed Tech Ticker. NASA Invites Media to Explore Mars Science Fiction and Fact in Cinema. How Can Agencies Balance IT Innovation and Cost Savings? Nextgov. GAO dings IRS, Secret Service techs-up for pope and more - FCW.com.

Cybersecurity Standards and Your Enterprise

CTOvision

As we have noted in the past, “The nice thing about standards is that you have so many to choose from” teaches Andrew S. Tanebaum in his classic text on Computer Networks. This adage is especially true when it comes to cybersecurity.