Red Tape

Mon
11
Apr

Regulations to Reduce Data Breaches

Contributed by David Mitchell

Over the past years there have been targeted data breaches that affected many large corporation and even the federal government. Target store and Office of Personnel Management OPM were two of the biggest data breaches of 2015. Some of these data breaches could have been identified or remediated if the corporation or government agency reported proper notification or conducted compliance audits as required by law. The Communication Act of 1934 and Health Insurance Portability & Accountability Act of 1996 are some of the regulations that protect this type of information. These regulations are due for an update by state and federal legislators to bring laws current with technology. Legislators are starting to show some focus on regulation or compliance for data breaches and cybercrimes after the data breach of Office of Personnel Management.

Fri
01
Apr

Understanding USB Flash Drives as Portable Infrastructure

Contributed by Ray Chance

The purpose of this white paper is to briefly discuss seven important topics everyone in business needs to know about USB flash drives. More importantly, this white paper is meant to challenge current business thinking that treats small portable devices as big security problems disguised as toys or high-tech gadgets. USB flash drives provide many valuable and productive functions in business. Managers need to look beyond short term concerns, rollup their sleeves, and make USB flash drives apart of their IT landscape. Just like wireless networking, managers must consider USB flash drives as the driving force behind a new, portable infrastructure.

This document is in PDF format. To view it click here.

Tue
01
Mar

Social Media Vulnerabilities and Considerations for the Corporate Environment

Contributed by Rob Hornbuckle

Mon
22
Feb

Security Synergy

Contributed by David Balaban

Unity is power. It's a simple lesson, power and strength come from unity. But for information security, we haven't quite learned this lesson yet. It's not that we're not trying, we've made a real progress over the years, but there's something fundamentally still missing. Maybe it's time for unity.

This document is in PDF format. To view it click here.

Wed
03
Feb

Five Mistakes of Incident Response

Contributed by Dr. Anton Chuvakin

All organizations have to care about security incident response! Unlike detection and prevention, the response is impossible to avoid. While it is not uncommon for the organizations to have weak prevention and detection capabilities, response will have to be there since the organization will often be forced into response mode by the attackers (be it the internal abuser, omnipresent ‘script kiddy’ or the elusive ‘uber-hacker’). The organization will likely be made to respond in some way after the incident has occurred.

This article presents five mistakes that companies make regarding security incident response.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Red Tape