A Feast For the Mind: Enrich Yourself as a Security Professional
I was inspired to write this post after reading an article my husband, Bharath Ramamoorthy, an architect wrote to inspire his team to take up courses as part of continuing education. Humans, by nature,...
View Article6 Ways Social Media Impacts Security For Business
Social media has definitely transcended the generation gap. My parents have taken to Facebook to keep in touch with extended family and to learn of updates of the second generation. The other day I was...
View ArticleEnabling the Promise of Secure Health
With an unsustainable growth rate that consumes 18% of the U.S. gross domestic product, the healthcare industry is at a “tipping point” for fundamental change. Technology will be the enabler for the...
View ArticleThere’s an ‘App for That’… EVERYWHERE. On-Prem, On-Demand, On-the-Go
Applications are ubiquitous. They run on our cars, smart phones, television, traffic lights, smart grids and medical devices. An application is something that we cannot get away from in today’s world....
View ArticleInformation Protection: Empowering Business Innovation
In 2011, businesses experienced an upsurge in high profile attacks by hacker activist groups (a.k.a. “hacktivists”) — such as Anonymous and LulzSec — and increasing monetization of attacks by organized...
View ArticleMobile Payments Bring New Opportunities – and New Threats
If modern technology is a universal language, today our world is getting schooled in innovation. Mobile devices have become an integral part of our lives. We game on them, surf on them, bank on them,...
View ArticleHospitality Industry Targeted by Cyber Criminals
Going on a vacation? How safe do you think your information is at the resort you just booked? I was reading a recent data breach report that said hotel and restaurant Point of Sales (POS) systems are...
View ArticleThe Security Investment Dilemma
I recently had the opportunity to attend the ABHS Leadership Program (ABHSLP) Leadership Development Conference. I had the opportunity to spend time with over 100 of our L2 managers representing every...
View ArticleThe Company You Keep: Reducing Exposure through Third-Party Risk Management
Growing up, my mom used this phrase quite often: “You are known by the company you keep.” Today, in the world of outsourcing, offshoring, integration, and collaboration, this adage is all the more...
View ArticleRethinking Your Security Program To Support The Perfect Storm
The need to stay connected and informed is propelling the growth of new technologies, such as mobility, social media, collaboration, cloud services, and communication. We have entered the age of...
View ArticleCybercrime Today
We are definitely seeing the role of innovation and the impact on human culture today. As 2012 came to a close, at social gatherings we witnessed folks old and young use iPads, tablets, and smartphones...
View ArticleThe Final Rule Is HERE
On January 17, 2013, the U.S. Department of Health and Human Services (HHS) issued a press release announcing publication of the final omnibus rule with Modifications to the HIPAA Privacy, Security,...
View ArticleSecurity Spotlight On Consumer Packaged Goods
When it comes to consumers, the experience is everything. The most successful Consumer Packaged Goods (CPG) companies are already leveraging interactive marketing and social media to drive awareness of...
View ArticleThere’s an ‘App for That’… EVERYWHERE. On-Prem, On-Demand, On-the-Go
Applications are ubiquitous. They run on our cars, smart phones, television, traffic lights, smart grids and medical devices. An application is something that we cannot get away from in today’s world....
View ArticleBack To The Basics With Data Security
These days, we use mobile devices for just about everything, from online purchases while we’re standing in line at the coffee shop to managing our bank accounts and storing confidential data. “Human...
View ArticleAre You In Business To Make Money Or Lose It?
Are you in business to make money or lose it? For most people, the answer to this question is a no brainer! As a security professional, I truly believe that security can impact your bottom line. It is...
View ArticleSecurity — A “Nice to Have” or a “Must Have”?
As the New Year begins, everyone is looking to learn more about upcoming 2014 technology and security trends. Experian’s 2014 Data Breach Industry Forecast predicts that new security threats and...
View ArticleAre Your Phone and Your Mobile Apps a Digital Reflection of You?
This morning, after I used the weather app, the alarm clock app, and the navigator app to get to work, I realized my phone has become a digital reflection of me! While we often think of mobile apps as...
View ArticleInformation Protection is Essential for Today’s Consumer Experience
Enterprise and business clients are usually the first to adopt the newest technology. Representing a variety of sectors, these companies leverage the latest and greatest systems for improving sales,...
View ArticleThreat intelligence tops the new cybersecurity agenda
Security intelligence is the component missing from many organizations’ defensive arsenals. Intelligence places IT security threats in context, adding information about “who” and “why” to the technical...
View Article
More Pages to Explore .....