practicallysecure.blogspot.com
Practically Secure:: August 2010
http://practicallysecure.blogspot.com/2010_08_01_archive.html
Information Security in the Real World. Confidentiality, Availability, Integrity, Practicality. Thursday, 26 August 2010. 55% care about PCIDSS. 41 of 74 respondents to a poll. On Anton Chuvakin's Security Warrior blog. Put PCIDSS top of their list of concerns. Alright it was a leading question and unscientific, but I'm pleased to see such interest anyway. Maybe this reflects the looming Level 1 deadline for full compliance. Subscribe to: Posts (Atom). What Is This Blog? 55% care about PCIDSS. Common Sen...
practicallysecure.blogspot.com
Practically Secure:: May 2012
http://practicallysecure.blogspot.com/2012_05_01_archive.html
Information Security in the Real World. Confidentiality, Availability, Integrity, Practicality. Tuesday, 22 May 2012. Don't forget the "A". IT Security is often described as the assurance of three qualities: Confidentiality, Integrity and Availability. CIA. The "C" is easy to understand, especially since so many organisations have been so helpful by their lack of it. So that we can all point and gawp at massive data losses (while secretly crossing our fingers and hoping the bad guys don't look our way).
practicallysecure.blogspot.com
Practically Secure:: Life in the old AV yet.
http://practicallysecure.blogspot.com/2012/05/life-in-old-av-yet.html
Information Security in the Real World. Confidentiality, Availability, Integrity, Practicality. Wednesday, 2 May 2012. Life in the old AV yet. Infosec Island: Why We Still Need Firewalls and AV. Just because they're not covering much of the attack space any more, doesn't mean they're not doing a job. Just because your car is now kept in the garage doesn't mean you forget to lock it. Why traditional commoditised controls are still useful, from Infosec Island. Posted by Evidence-Based Al. What Is This Blog?
practicallysecure.blogspot.com
Practically Secure:: May 2010
http://practicallysecure.blogspot.com/2010_05_01_archive.html
Information Security in the Real World. Confidentiality, Availability, Integrity, Practicality. Friday, 28 May 2010. RACF Permissions in ITIM. Available now on Pirean.com is some new System z content. Also on the Pirean System z page you will see a link to a PDF you can download describing the new adapter for Tivoli Identity Manager Pirean has created. I'm very proud of my role in this, and grateful to Stephen Swann. Wednesday, 19 May 2010. System z roadshow in Atlanta is Go! And see earlier blog post.
practicallysecure.blogspot.com
Practically Secure:: September 2010
http://practicallysecure.blogspot.com/2010_09_01_archive.html
Information Security in the Real World. Confidentiality, Availability, Integrity, Practicality. Wednesday, 29 September 2010. InfoReck blog, great minds etc. I'm delighted to have found this blog. Written by Robb Reck, because we share a common belief that Compliance does not equal Security, and worse, that Compliance efforts can make you less secure. This post summarises his position and is essential reading for Infosec professionals and CISOs. InfoReck Blog Archive Security Leads to Compliance.
practicallysecure.blogspot.com
Practically Secure:: March 2012
http://practicallysecure.blogspot.com/2012_03_01_archive.html
Information Security in the Real World. Confidentiality, Availability, Integrity, Practicality. Thursday, 15 March 2012. BYOD - not if, but when. If your business is still locked into the "corporate desktop" model, you are losing competitive advantage over more creative approaches to device management in your organisation such as "Bring Your Own Device", while also ignoring the risk of BYOD already happening "under the radar" right now. Is making traditional anti-virus and anti-spyware controls inneffect...
practicallysecure.blogspot.com
Practically Secure:: BYOD - not if, but when.
http://practicallysecure.blogspot.com/2012/03/byod-not-if-but-when.html
Information Security in the Real World. Confidentiality, Availability, Integrity, Practicality. Thursday, 15 March 2012. BYOD - not if, but when. If your business is still locked into the "corporate desktop" model, you are losing competitive advantage over more creative approaches to device management in your organisation such as "Bring Your Own Device", while also ignoring the risk of BYOD already happening "under the radar" right now. Is making traditional anti-virus and anti-spyware controls inneffect...
practicallysecure.blogspot.com
Practically Secure:: February 2011
http://practicallysecure.blogspot.com/2011_02_01_archive.html
Information Security in the Real World. Confidentiality, Availability, Integrity, Practicality. Wednesday, 16 February 2011. Information Wants to be Free 2.0. It's a refrain from the early days of computer hacking. A rallying cry of hackers, anti-censorship activists and just plain anarchists it dates back at least to the mid-80s use by Stewart Brand. Quotes the old hackers mantra as one of five new "Irrefutable Laws of Information Security". The five "laws" in Intel's model are:. Code wants to be wrong.
practicallysecure.blogspot.com
Practically Secure:: November 2011
http://practicallysecure.blogspot.com/2011_11_01_archive.html
Information Security in the Real World. Confidentiality, Availability, Integrity, Practicality. Monday, 21 November 2011. The Cloud Security Standard is out, and the ISO27001 author is unhappy. What tangled webs we weave -David Lacey. The real challenge however will be to turn this impressive body of knowledge into something of practical use to busy security managers. ". NB I have finally edited this post to add my commentary, sorry for the delay! Posted by Evidence-Based Al. Subscribe to: Posts (Atom).