Technology, security, analytics and innovation in the world of audit and business.
Monday, September 29, 2008
PCI Compliance: Does It Equal Security?
The standards of the Payment Card Industry have been driving some new spending on security and the question has come up as to whether that actually imporves security. Generally, anything that encourages attention to security is a good thing. Of that there can be little doubt. PCI Compliance: Does It Equal Security?
Thursday, September 25, 2008
Apple's iPhone A Tight Fit For The Enterprise -- iPhone -- InformationWeek
With all the recent hype about the iPhone, inevitably there has been some analysis as to how it would fit into business systems. This article explains the limitations involved in making it a controlled part of the system. Apple's iPhone A Tight Fit For The Enterprise -- iPhone -- InformationWeek
Monday, September 22, 2008
CGEIT Certification
CGEIT Certification: "ISACA recognized this shift in emphasis in 1998, and formed the IT Governance Institute (ITGI) to focus on original research, publications, resources and symposia on IT governance and related topics. To support and promote this significant body of work, ISACA and the ITGI are proud to offer a certification program for professionals charged with satisfying the IT governance needs of an enterprise."
Friday, September 19, 2008
Thought Center - A Balanced Approach to Risk and Performance
A series of podcasts on the E&Y site provides some thoughtful analysis on risk and controls. Thought Center - A Balanced Approach to Risk and Performance
Wednesday, September 17, 2008
Forever 21 says nearly 99,000 cards compromised in data thefts
Another huge data breach has been announced, this time the work of hackers. Forever 21 says nearly 99,000 cards compromised in data thefts
Monday, September 15, 2008
Open phones are more vulnerable, security execs say
Already seriously challenged by mobile devices, security administrators now have to cope with increased security risks from mobile phones because of a movement towards open source operating systems on the devices. Open systems raise the possibility of hacker meddling in those phones and therefore can provide a gatwway into some systems. Open phones are more vulnerable, security execs say
Friday, September 12, 2008
Radical Desktops Deliver Power To The People. But What About IT? -- Tomorrow's Desktop
Cloud computing, Virtualization and the like are changing the way IT departments deliver capability to the users. It'll give them more flexibility and will have major implications for systems management and security. A new challenge for systems assurance. Radical Desktops Deliver Power To The People. But What About IT? -- Tomorrow's Desktop
Thursday, September 11, 2008
The ISSA Journal
The ISSA Journal for August 08 contains a lead article that explores how established silos impede the management of security risk in contemporary systems. It's a timely message, given the expansion of modern systems through varying platforms and numerous kinds of mobile devices. The ISSA Journal
Monday, September 8, 2008
The key to data security: Separation of duties
Separation of duties has been a key aspect of good controls for many years - in finance pretty well since controls began. In the world of IT, however, it has not been so well recognized, although auditors have been pushing it for years in their recommendation letters. This article looks at this issue, and supports the use of good separation of duties for IT security. The key to data security: Separation of duties
Friday, September 5, 2008
Security ROI: Fact or fiction?
ROI is often suggested as a measure of the worth of security measures, especially by some vendors. But it's a flawed concept and could result in bad security decisions because security is not an investment and should not be treated as such. This article expands on this view. Security ROI: Fact or fiction?
Thursday, September 4, 2008
Aberdeen Group: The 2008 Email Security Report
A new Aberdeen Group report focuses on the risks to information security posed by email. It is well known that the risks are considerable. The report explores the issues in some depth and then applies a PACE model to addressing those risks. Aberdeen Group: The 2008 Email Security Report
Subscribe to:
Posts (Atom)