logicalsecurity.wordpress.com
Siri Hacked. That didnt take long… | Logical Business Information Security
https://logicalsecurity.wordpress.com/2011/11/17/siri-hacked-that-didnt-take-long
Logical Business Information Security. The art and science of business security. Siri Hacked. That didnt take long…. Http:/ www.esecurityplanet.com/mobile-security/siri-security-protocol-hacked.html. Share on Facebook (Opens in new window). Click to print (Opens in new window). Click to share on Twitter (Opens in new window). Click to share on Reddit (Opens in new window). Click to email (Opens in new window). This entry was posted in Uncategorized. LINK: Great blog post on security risk management.
logicalsecurity.wordpress.com
Protection of Information Bill and its Practicality relating to Information Classification | Logical Business Information Security
https://logicalsecurity.wordpress.com/2011/11/22/protection-of-information-bill-and-its-practicality-relating-to-information-classification
Logical Business Information Security. The art and science of business security. Protection of Information Bill and its Practicality relating to Information Classification. A bill was passed in South African parliament today [search Twitter for #POIB or #blacktuesday] which will effectively make it a criminal offence to possess and publish classified information (I wonder if that includes those who are responsible for managing it? The net result in this scenario is that it could be harder to implement th...
logicalsecurity.wordpress.com
Rob Bainbridge | Logical Business Information Security
https://logicalsecurity.wordpress.com/author/mungbarry
Logical Business Information Security. The art and science of business security. Author Archives: Rob Bainbridge. Repost: Is it time to re-invent the role of the CISO? Http:/ www.enterprisecioforum.com/en/blogs/wh1t3rabbit/it-time-re-invent-role-chief-information. Share on Facebook (Opens in new window). Click to print (Opens in new window). Click to share on Twitter (Opens in new window). Click to share on Reddit (Opens in new window). Click to email (Opens in new window). Posted in Information Security.
logicalsecurity.wordpress.com
Repost: Data Security and I&AM | Logical Business Information Security
https://logicalsecurity.wordpress.com/2011/12/07/repost-data-security-and-iam
Logical Business Information Security. The art and science of business security. Repost: Data Security and I&AM. Interesting opinion of data and information security and current access challenges:. Http:/ www.forbes.com/sites/benkerschberg/2011/12/07/data-security-and-identity-access-management/. Share on Facebook (Opens in new window). Click to print (Opens in new window). Click to share on Twitter (Opens in new window). Click to share on Reddit (Opens in new window). Click to email (Opens in new window).
logicalsecurity.wordpress.com
Repost: list of good info sec people to follow | Logical Business Information Security
https://logicalsecurity.wordpress.com/2011/12/14/repost-list-of-good-info-sec-people-to-follow
Logical Business Information Security. The art and science of business security. Repost: list of good info sec people to follow. Repost from the ISGAfrica site, originally from Tripwire – a great selection of influential security practitioners to follow:. Http:/ www.isgafrica.org/blog/archives/1111. Share on Facebook (Opens in new window). Click to print (Opens in new window). Click to share on Twitter (Opens in new window). Click to share on Reddit (Opens in new window). And tagged information security.
logicalsecurity.wordpress.com
Repost: Is it time to re-invent the role of the CISO? | Logical Business Information Security
https://logicalsecurity.wordpress.com/2012/03/07/repost-is-it-time-to-re-invent-the-role-of-the-ciso
Logical Business Information Security. The art and science of business security. Repost: Is it time to re-invent the role of the CISO? Great topical article on the role of the CISO and alignment to business objectives. This is in line with one of my previous posts regarding the responsibilities of the CISO – as with all other roles the value add and justification of the CISO should be assessed against the backdrop of the business, external factors and strategic initiatives. Leave a Reply Cancel reply.
logicalsecurity.wordpress.com
Logical Business Information Security
https://logicalsecurity.wordpress.com/page/2
Logical Business Information Security. The art and science of business security. Information Security 101 (#sec101). Coincidently, this is a theme common to some of my previous posts. I believe it is a sign of the times – that as we continue to experience data breaches we find fundamental control failures are behind many of them, which is what prompted me to write my previous posts. October is ‘Cyber Security Awareness Month’ over at the SANS ISC diary page. There are plenty of great contributions on the...
SOCIAL ENGAGEMENT