Preventing data loss or reacting to data loss.

I love New York but I live in Israel. DLP (Data Loss Prevention or extrusion prevention) is an important category of IT security that helps protect data from leaving the network. Keeping the good stuff in, as opposed to keeping the bad guys out. Israel has a booming IT security industry with Checkpoint, Radware, Algosec, […]

What do hackers want?

What do hackers really want? No question is more important for mounting  effective security countermeasures. The management, IT and security practitioners cannot expect to mitigate risk effectively without knowing the objectives and cost of potential attacks on their organization. We all depend on transaction processing to run our business and make decisions, no matter how […]

User BI applications – think before you go for it

According to research by Gartner: “IT won’t have much of a role in the emerging business-intelligence technology as the tools make it easier for users to build their own analytic applications. To address users’ increasing independence, Gartner suggests that IT departments incorporate the new technologies into the standard BI architecture, communicate which performance measures should […]

Triple play in South Africa

Safika-controlled Goal Technology Solutions (GTS) and Dimension Data’s Internet Solutions, have designs on delivering affordable TV services to SA households. Neither will need a pay-TV licence from the Independent Communications Authority of SA (Icasa) as the service, which is delivered on demand, is not technically defined as broadcasting. operators could soon face competition from ISPs  […]

The danger of losing your digital assets in a down market

Any information security professional will tell you that security countermeasures are comprised of people, processes and technology.  The only problem is that good security depends on stable people, processes and technology. A stable organization undergoing rapid and violent change is an oxymoron. People countermeasures are a mix of security awareness training, background checks (at a […]

Business threat modeling

These are dangerous times for a business. Every day brings another threat. The sub-prime crisis, the crash of world financial markets, the price of oil (going way up and now going down again), an impending crash of the US sub-prime credit card market (like how long can you charge 35% over the top interest rates?), […]

7 tips to improve security in a tough economy

Are you waiting for the next Gartner Security Report, making plans to evaluate some technology your CEO might not approve after she slashes your funding and maybe your job? As a security professional, you can blame hackers, buggy software and the economy – or you can do something different. “Life is what happens to you […]

When should you encrypt email?

A while back, a colleague asked me what is the best way to encrypt internal email. My first question to him was – what is the threat,  who is  the attacker and what is the asset you are protecting? Are you trying to encrypt business communications between employees and vendors/customers to protect from eavesdroppers or […]