Successful leaders know that sometimes the way to maintain or regain momentum is to take a tactical pause. It's time to take a step back, survey the situation, and make sure available budget and resources are both aligned with the needs of the business and focused on producing the most value. Consider if a tactical pause is necessary by asking and answering three often-overlooked, important questions: Can you quickly list the top 3 priorities for the security team? Not 5, 10, or more. The top 3. How are those priorities aligned to the business?If established at the beginning of the year (or earlier, based on budgeting), are the priorities still the best place to focus between now and the end of the year?
Via Higher Ed InfoSec Council
From smartwatches to mobile heart monitors, wearable technology is changing our world as we know it.According to the latest projections from ABI Research, the global market for wearable wireless devices in sports and healthcare will approach 170 million units by 2017.
October is National Cyber Security Awareness Month—a great time to check in with your family about their online safety habits. Are everyone’s devices and apps up to date with the latest security? When was the last time you reviewed your children’s online profile, or helped them update the privacy settings on their social networks?
For teens in particular, it’s important to help them prepare to deal with the “drama” that can unfold within their online social circles. While teen conflict is nothing new, today’s gossip, jokes, and arguments often play out through social media like Formspring, Twitter, and Facebook. Teens often refer to this as “drama.”
We’ve asked Linda McCarthy, online safety expert and author, to share insights about her new digital book, Digital Drama: Staying Safe While Being Social Online. [Download the book at no cost between September 24-27. English and Spanish versions of the ebook are available.]
Certain skill sets may be a commodity in the IT field these days, but EMC's Security for Business Innovation Council's latest report may have some solutions for building an effective security team.
"According to the SBIC report, information security is no longer just about implementing and operating security controls, but the mission has evolved to "include advanced technical and business-centric activities such as: business risk analysis, asset valuation, IT supply chain integrity, cyber intelligence, security data analytics, data warehousing, and process optimization.
This mission growth translates into a need for specific skill sets, but the shortage of such talent makes building an effective team a monumental task. However, with this problem comes an opportunity.
In many organizations, personnel outside of security are starting to realize that they — not security — own the risks to their information assets and they need to actively partner with security to manage those risks," the SBIC report states.
To be successful, the information security function is a cross-organizational endeavor, with security processes deeply embedded into business processes."
“ Cyber security challenge seeks Raspberry Pi enthusiasts New Electronics Looking to address a skills gap in the UK cyber security industry, Abingdon based software specialist Sophos has called on the developer and coding community to create designs...”
Via F. Thunus