Protected: SmartPhones Extend the Perimeter of Your Network and Increase Risk
This content is password protected. To view it please enter your password below: Password: Enter The post Protected: SmartPhones Extend the Perimeter of Your Network and Increase Risk appeared first on...
View ArticleCybersecurity isn’t the same thing as information assurance.
Last March the DoD announced the retirement of DIACAP in favor of an information-assurance approach based on NIST’s risk management framework (RMF). This transition had been anticipated for quite...
View ArticleCyber Rope-A-Dope
A look back in boxing history provides a useful analogy in appraising our fight in the world of cyberspace. For instance, take the premiere boxing event of the last century, the “Rumble in the...
View ArticleHow to Protect Your Business from Reverse Engineering & Code Modification
Reverse engineering and code modification present significant security and business risks. They allow for malicious hackers (or competitors) to easily gain access to your proprietary source code,...
View ArticleAre there really only “two kinds of enterprises”?
Has every company really been hacked? Is every company really going to be? A popular meme in the information security industry is, “There are only two types of companies: those that know they’ve been...
View Article
More Pages to Explore .....