TECHNOLOGY originally published on DaftBlogger.com Wanted Dead or Alive: The Human Factor By Antonio Ieranò on September 29, 2013 at 7:45 PM Contents [hide] 1 From where should we start? 2 I said it all but… 3 Theory? OK I confess I am quite bored to listen to all those knowledgeable IT security experts talking about what is needed to secure a system. Everyone has his own point of view; of course they’re right when they say we need end-point security, mobile protection, anti-malware, anti-hacking, dlp, advance threat defense and protection. We all know we need firewalls, IPSIDS, cypher encryption systems, SSO, 802.1x, strong authentication, anti-virus, anti-everything,…
Like this:
Like Loading...
In my previous article, security costs and security budget, I made some assumption to simplify an introductory analysis on how much we should spend on security. Some of those assumptions have been made to simplify out tasks. Today I would like to quickly analyse some of those simplifications. One of the biggest assumption I made on the previous article is that if a problem cost us X then we can find a number n that express the number of incidents I’m allowed to permit so that nX can express the cost I’m allowed to accept. This simplification was based on…
Like this:
Like Loading...
When I’m talking about security with customers, partners or at an event the first question I usually receive is: “how much this will cost to me?” This is an understandable question, costs have to be monitored and expenditure have to be planned wisely, the problem of  how much I canshould spend on security is a quite interesting topic. The problem, alas, is that usually IT managers do not use a clear model when planning investment in security but seamed to be attracted more by strange inner believes than a empirical analysis of cost and benefits. Another point that I’ve always found quite curious is that I’ve…
Like this:
Like Loading...
(ISC)2 Italy Chapter Site » Mobile Security Series – Beyond BYOD – Slides Mobile Security Series – Beyond BYOD – Slides inShare1 Le slide del primo approfondimento (ISC)2 Italy Chapter sul Mobile (Beyond BYOD) sono disponibili ai soci a questo link(*): Webinar – (ISC)2 Italy – Mobile Series 1 – Beyond BYOD Ringraziamo tutti coloro che hanno seguito il seminario e ancor di piu’ chi ha dedicato del tempo per completare il sondaggio sull’iniziativa. Stay tuned: nelle prossime settimane vi informeremo sulle date del secondo e poi del terzo seminario della serie. (*) Per accedere alle slides e’ necessario essere Soci di (ISC)2 Italy Chapter; l’utenza…
Like this:
Like Loading...
Steve Purser, Head of the Technical Department, ENISA (Photo credit: Security & Defence Agenda) Security Summit :: Il 12 marzo si apre l’edizione 2013: pronto il programma, definiti i contenuti Il 12 marzo si apre l’edizione 2013: pronto il programma, definiti i contenuti E’ praticamente definito il programma della prima tappa del Security Summit 2013 che si aprirà la mattina del 12 marzo a Milano. Si inizia infatti con un ospite d’eccezione, Steve Purser, Head of Technical Department, ENISA – European Network and Information Security Agency, che disegnerà il quadro dei progetti europei in tema di Ict security, tema di grande rilevanza…
Like this:
Like Loading...
È uscito il rapporto clusit sulla sicurezza informatica in italia, una finestra autorevole per conoscere lo stato della cybersecurity nel nostro paese. La documentazione si può scaricare direttamente e gratuitamente dal sito clusit 🙂 o direttamente dal link del security summit. Related articles The First Italian Cybercrime Report is Available [Infographic] (hackmageddon.com) Forensic incident response to the fore (scmagazine.com) Browse with a shared device,but watch out! (smiley2.wordpress.com) Browse with a shared device,but watch out! (securitytoolbox.wordpress.com) Spending your 2012 IT Security budget – beware of cheap, look for value (h30499.www3.hp.com) How ICT World Lived By Q1 2012 (it-sideways.com) Business insurance news:…
Like this:
Like Loading...
You must be logged in to post a comment.