Сообщество руководителей ИТ-компаний, ИТ-подразделений и сервисных центров

Статьи в блогах Вопросы и ответы Темы в лентах Пользователи Компании Лента заказов Курс по ITSM

Информационная безопасность

Mirror Talk

You are stubborn. You lie. You are immature. There are people you have hurt, and there are those who are still hurting by your untruthfulness. You are filled with greed, envy, impatience, anger, and secrecy.
Sometimes, I tend to separate myself from these actions and characteristics as if I do not commit the same crimes myself. Although, what angers me most are the faults I find in others that I know exist within myself. I have buried my darkest actions so far deep in my soul that they might be the foundation that upon the rest of me is built.

Читать дальше

I Grow Up

The first time I had the question before me was Mrs. Delucia’s second grade class. Our class was decorating that outside bulletin board by our door. You know, the ones outside every class regardless of level that low key instilled pride for your room. “When I Grow Up” embellished our board, slowly populated by human stencils cut from a Manilla legal sized folder. With the cut cardstock in-hand, our task required us to draw ourselves in our desired future. I gazed at the blank canvas, swept away by the idea that “I could draw ANYTHING?”

Читать дальше

Stop Being A Waiter

So for people who know me personally, I happen to be in a chapter of my life where I’m a waiter.  I do my best to provide exceptional table service at my favorite Korean BBQ restaurant.  However, in the context of this post, I want to talk about a different kind of waiting.  Something we all do, whether it’s in line, in hopes of an upcoming event, or simply just waiting for that text back or application to be approved.  Waiting sucks, yet we are all victims of it.  Let me tell you how to conquer it.

Life is like a game of chess.  Half the time it’s your turn, the other half it’s your opponent’s.  When it’s our turn, that’s when we decide to act.  We contribute our energy and make our move.  We send the email, ask the girl out, and pitch the idea.  A sigh of relief happens when we make our move, but when it’s our opponent’s turn, we succumb to waiting.  That’s when the “what ifs” flood our mind.

Читать дальше

Trouble In Authentication Land

Bank fraud and identity theft are a frightening reality, both for the banker and the consumer. The number of consumers affected by widespread debit card fraud may be a good thing. The impact on people's bank accounts may have increased acceptance towards "disruptive technologies", i.e., hardware tokens. This may be the perfect storm for banks. You have the customer's permission to tell them what to do.

Читать дальше

Security Audit Findings Spurring Organizational Change

The demands of new regulations, including the Sarbanes-Oxley Act, Gramm-Leach-Bliley, the Patriot Act, and disclosure statutes for security breaches, are forcing banks to implement stringent information security measures. The auditing of information technology—once a rather staid component of a an auditing firm's practice—has gone gangbusters with the explosion of legislation and the publicity surrounding hacking incidents and losses of customer data.

Читать дальше

information security

Information security (infosec) is a set of strategies for managing the processes, tools and policies necessary to prevent, detect, document and counter threats to digital and non-digital information. Infosec responsibilities include establishing a set of business processes that will protect information assets regardless of how the information is formatted or whether it is in transit, is being processed or is at rest in storage.

Читать дальше

An impact-focused cyber breach exercise

A stark reality of today's world is that businesses must constantly defend against relentless attempts to steal their computer data or damage their systems. Few, however, have serious plans for how they will respond to the impact of an actual breach - and even fewer stress-test those plans.

Читать дальше

SecuriTay 2017 & the Future of An Industry

At SecuriTay, the talks ran into two tracks in a packed day of content. Opening the conference with the keynote was Abertay University graduate turned NCC Group senior security consultant Gavin Holt, who presented on Active Directory and “adventures in pen testing Windows Estates.” Explaining that Active Directory is used by everyone from small businesses to huge global institutions, Holt ran through a number of obfuscated case studies of examples where Active Directory had been done badly.

Читать дальше

Developing an impact-focused cyber breach exercise

A stark reality of today’s world is that businesses must constantly defend against relentless attempts to steal their computer data or damage their systems. Few, however, have serious plans for how they will respond to the impact of an actual breach – and even fewer stress-test those plans. Such exercises force real-time situation analysis and decision-making while recognizing that cyber incidents are infinitely more complicated than other events.

Читать дальше

How to make Android App Development Easy

Android, the most popular OS for mobile devices, is still on a growth trajectory. Developing Android apps have now become indispensable for anyone who requires a strong presence in the vital mobility space. Here are some Android app development tips that make such app development easy, without getting bogged down with self-defeating complicated and extensive projects.

Читать дальше