Data Security Action Plan for Small Enterprises (3)
In my last blog we created a baseline for an organization, this series has been focused on guidance for smaller companies but the basic principles can be applied to any organizations. The key...
View ArticleSo what are the new rules for COREP and FINREP?
From 1 January 2014, banks will need to report thousands of additional risk and capital data points – a huge increase in frequency, volume and complexity when compared to previous reporting...
View ArticleWhat characteristics do we need to create a data-driven security model for...
In my previous blog I discussed how value can be derived from collecting all data and ensuring that the data was actually analyzed. So what types of data and system capabilities do we need to build a...
View ArticleSmart Grid Architecture
In the ramp-up to the European Smart Grid project that I’ve mentioned in a number of earlier blogs, I often find myself paying particular attention to the security implications of energy-related events...
View ArticleAPT’s effectively challenged by RSA
The recent announcement that the massive data breach at Target was the result of an APT attack has underscored the critical importance of improving our techniques for rapidly detecting, analyzing and...
View ArticlePrivacy and Security as Partners in Trust: More than a Balance
I was in Dublin recently to speak once again at the Secure Computing Forum. The theme this year was “Security and Privacy: Getting the Balance Right”, so I talked briefly about the KPMG report that I...
View ArticleWindow XP Rest in Peace
Last week Microsoft finally stopped support and updates for Windows XP. Windows XP might rest in peace but for millions of PC’s still running this operating system peace is the last thing they will...
View ArticleEMC world 2014 Characterised by Security and Trust
I’ve attended EMC world every years since 2007 and for the past several years have coordinated the RSA sessions that are presented there. Once again this year there will be a lot of great content for...
View ArticleSecurity deficiencies: Top 10 found in Security Assessments from RSA’s Rashmi...
Security assessments are finally becoming accepted as something that organisations must do to understand and improve their security deficiencies. Time and time again companies fail at the very basic...
View ArticleBig Data is Big – and Security! – at EMCworld 2014.
I’m at EMCworld 2014 this week, coordinating the security-related sessions, meeting with customers and doing briefings. There hasn’t been time for me to go to any sessions other than the RSA ones,...
View Article
More Pages to Explore .....