Remove Information Security Remove Mobile Remove Report Remove Security
article thumbnail

The CISO Technology Report: Twice A Week Review For Enterprise Security Professionals

CTOvision

Our site CISOtech.com is a repository of articles and information of interest to enterprise security professionals. Any reporting we do here at CTOvision that has relevance for the CISO is archived at that site, plus evaluations on cyber security technologies of interest. Please sign up for this report here.

article thumbnail

Automation For The Better Good - Security

Forrester IT

However, if you asked the most diehard Luddites if they were ready willing to give up the following: Depositing a check using a mobile app. What these tasks have in common (in addition to relying on automation): a critical dependence on security. Information Security. Security Operations & Program Governance.

Security 346
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Fixed wireless access (FWA) is a secure networking option

CIO Business Intelligence

When making decisions about network access, businesses need to be aware of and assess the security implications associated with network technology to help keep their digital assets protected. Cyber hygiene best practices include device security , cyber security education , and secure networking strategies.

article thumbnail

GovLoop Releases Report: Winning the Cybersecurity Battle

CTOvision

By Pat Fiorenza As part of the Agency of the Future Series, GovLoop has released the report, “ Winning the Cybersecurity Battle. As a nation, we must work collaboratively to ensure that cyber defense strategies are robust and effective to secure our way of life. You can read the report online or can download a PDF here.

Report 193
article thumbnail

AT&T Becomes the Latest Company Affected by Data Breach

CTOvision

The urgency of improving information security cannot be understated. Since the widely publicized attack on Target Corporation, data breaches have become increasingly common – sensitive information stored with both eBay and the California Department of Motor Vehicles has been compromised in the last six months alone.

Company 268
article thumbnail

Dunkin Donuts Forced to 'Fill Security Holes' in Data Breach Settlement

SecureWorld News

Now the company is being forced to take certain information security measures and pay a $650,000 fine to the state of New York. New York's Attorney General did not hold back: “For years, Dunkin’ hid the truth and failed to protect the security of its customers, who were left paying the bill.

article thumbnail

InfoSec Policies and Standards: Some strategic context for those just diving into this world

CTOvision

Organizations are giving more priority to development of information security policies, as protecting their assets is one of the prominent things that needs to be considered. So an organization makes different strategies in implementing a security policy successfully. Security policies are tailored to the specific mission goals.

Policies 268