Tabletop exercises enable organizations to analyze potential emergency situations in an informal environment, and are designed to foster constructive discussions among participants as they examine existing operational plans and determine where they can make improvements.
Bob Violino |
28 Oct |
Read more
What does the future hold for enterprise security? What will programs, roles, technologies and policies look like in five years or so?
Bob Violino |
08 Jul |
Read more
The old adage that the only thing that's constant is change certainly applies to the world of information security. Whether it's the ever-shifting threat scenarios or the technologies designed to thwart them, new developments seem to be happening all the time.
Bob Violino |
19 Jun |
Read more
Apple has improved its security in recent years, but is it enough?
Bob Violino |
10 Mar |
Read more
Security executives have taken on much more responsibility and visibility in recent years as threats to corporate information assets and physical resources have increased.
Bob Violino |
04 Feb |
Read more
Regulations aimed at protecting the security and privacy of organizations and individuals are well meaning. But sometimes these standards, or how they're interpreted, can be more than a nuisance--they can actually contribute to weaker security.
Bob Violino |
06 Jan |
Read more
There's a trend underway in the information security field to shift from a prevention mentality--in which organizations try to make the perimeter impenetrable and avoid breaches--to a focus on rapid detection, where they can quickly identify and mitigate threats.
Bob Violino |
02 Jan |
Read more
The past year has seen its share of newly emerging or persistent threats that security and IT executives need to be aware of and in many cases defend against.
Bob Violino |
11 Dec |
Read more
If you're an Android user -- or want to be -- you've likely heard about all the security risks of Google's mobile operating system. But how real are these threats, and how much damage can they do? Despite the fears, are Android devices actually a safe bet for an enterprise mobility strategy?
Bob Violino |
09 Dec |
Read more
You've probably been hearing a lot lately about the Internet of Things (IoT). The IoT (see: "The IoT: A Primer" at the end of this piece), while still in the early stages of development, is slowly making its way into the mainstream as more objects become connected via technology such as radio frequency identification (RFID) and the iniquitousness of the Internet.
Bob Violino |
15 Oct |
Read more
Here's whats on the homepage of The Reference Store, which bills itself as the world's leading virtual reference service: Unemployed? Fired? Forced Out? Bad Reference? Create an entirely new work history using our fake reference service. Dont let these issues keep you from finding meaningful work. Explain away these periods using one of our Virtual Companies. Our fake companies are so real, our Virtual Companies actually get sales calls from the public.
Bob Violino |
31 Jul |
Read more
The rapid growth of mobile devices that can access corporate networks and data, the expanding use of cloud-based IT services, and the increasing popularity of apps such as online banking mean that IT needs to pay closer attention to authentication.
Bob Violino |
10 Jun |
Read more
Security Business Intelligence (SBI) earned Intel top honors in the CSO40 awards, which recognize security projects that have delivered outstanding business value.
Bob Violino |
04 Apr |
Read more
Organizations sometimes rush to implement security solutions without taking the time to ensure that the products will work optimally in their environment, in hopes of dealing with immediate security shortfalls. But putting in the effort to meld new solutions with the existing infrastructure increases the likelihood of a successful deployment.
Bob Violino |
29 Jan |
Read more
Security pros and government officials warn of a possible cyber 9/11 involving banks, utilities, other companies, or the Internet
Bob Violino |
28 Jan |
Read more