I can only assume a good dose of paranoia puréed with a Napoleonic complex sprinkled with feelings of inadequacy stirred with a dash of Mighty Mouse (Here I come to save the day…) and a sprig of Bill the Cat was behind this effort.
CARVIEW |
Another new tool caught my eye this week that needs your attention - Cauldron.
Intel commissioned a study on the true cost of a lost or stolen laptop to an enterprise. The Ponemon Institute put the average price at nearly $50,000, with extreme cases nearing $1 million.
Dr. Ayman Zawahiri released a new video yesterday entitled Six Years Since the Invasion of Iraq - Thirty Years Since the Signing of a Peace Agreement with Israel
Find out more on Tuesday April 21 at RSA - 5:40PM
The Internet is the platform of choice for most extremist activities. This talk will take an in-depth look at extremist jihadi groups through their own sites, as a method of information dissemination, recruitment, product development, and propaganda using our encryption, our tools, and our virtual environments.
Key leaders within both the information security and cloud computing industries announced on March 31st the formation of the Cloud Security Alliance, to be formally launched at the RSA Conference 2009, in San Francisco on April 21, 2009. The Cloud Security Alliance is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing.
This represents both the immaturity of our profession and the highly complex nature of information security while challenging the concepts that many professionals adhere to – that ISO27001, CobiT, COSO, FRAP, OCTAVE, etc., are frameworks when in fact there are just a piece of the overall framework pie.
We don’t know what we don’t know
We know of some things we don’t know
The company really seems like it doesn’t want to know
Can you imagine if code was written poorly for NASA and the Space Shuttle program? Sorry astronauts, no oxygen today due to a coding buffer overflow. My apologies but we just wanted to get this out the door fast and all the features and use cases for the app work just fine so what’s your beef!?!
- Level of Maturity
1 week 3 days ago
- oppinion
4 weeks 2 days ago
- I use Linux but...
4 weeks 3 days ago
- Dumb
6 weeks 19 hours ago
- QA
6 weeks 21 hours ago
- Identifying and Addressing Evolving Threats
- Millennial Meltdown: Balancing Innovation with Productivity and Security
- Email Continuity: You Don't Know What You've Got Till it's Gone
- Monitoring Enterprise-wide Business Risk
- Get Sophisticated About Your Web Application Security
- The Tripwire HIPAA Solution: Meeting the Security Standards Set Forth in Section 164
CSO Corporate Partners
Digital ID World

-
September 14 - 16, 2009Rio Hotel and CasinoRegister Now »
Las Vegas, Nevada
(ISC)2 members can earn up to 24 CPE Credits!
Reference priority code ONLINE and attend the full conference for the reduced rate of $995!
- Home |
- About |
- Privacy Policy |
- Terms of Service |
- Subscription Service |
- Advertising |
- Events |
- Site Map

THE IDG NETWORK
- CIO |
- Computerworld |
- GamePro |
- Games.net |
- IDG Connect |
- IDG Tech Network |
- IDG World Expo |
- Industry Standard |
- Infoworld |
- ITworld |
- JavaWorld |
- LinuxWorld |
- Mac User |
- Macworld |
- Network World |
- PC World |
- Playlist