Data loss by cellphone

Is your 50-something IT manager the last one to know about the company getting acquired? An extremely obvious yet perhaps unpleasant observation for over-40 IT managers is that under 30 employees know a lot more about technology and ways to bypass the company security safeguards than they do. A young, hip, mobile and techology-facile workforce […]

Triple play in South Africa

Safika-controlled Goal Technology Solutions (GTS) and Dimension Data’s Internet Solutions, have designs on delivering affordable TV services to SA households. Neither will need a pay-TV licence from the Independent Communications Authority of SA (Icasa) as the service, which is delivered on demand, is not technically defined as broadcasting. operators could soon face competition from ISPs  […]

The danger of losing your digital assets in a down market

Any information security professional will tell you that security countermeasures are comprised of people, processes and technology.  The only problem is that good security depends on stable people, processes and technology. A stable organization undergoing rapid and violent change is an oxymoron. People countermeasures are a mix of security awareness training, background checks (at a […]

Business threat modeling

These are dangerous times for a business. Every day brings another threat. The sub-prime crisis, the crash of world financial markets, the price of oil (going way up and now going down again), an impending crash of the US sub-prime credit card market (like how long can you charge 35% over the top interest rates?), […]

7 tips to improve security in a tough economy

Are you waiting for the next Gartner Security Report, making plans to evaluate some technology your CEO might not approve after she slashes your funding and maybe your job? As a security professional, you can blame hackers, buggy software and the economy – or you can do something different. “Life is what happens to you […]

When should you encrypt email?

A while back, a colleague asked me what is the best way to encrypt internal email. My first question to him was – what is the threat,  who is  the attacker and what is the asset you are protecting? Are you trying to encrypt business communications between employees and vendors/customers to protect from eavesdroppers or […]