Smart Phones – Convenience or Threat?

The use of smart phones to access sensitive corporate information away from the office is creating huge security gaps for enterprises. Smart phones are being used to access company mails and applications. Atleast one major breach involving theft of application code has been attributed to malware from smart phones. So how do we benefit from the technology while addressing the risks Continue reading “Smart Phones – Convenience or Threat?”

Log Management and Intelligence-LMI

Introduction

LMI is a governance enabler. Log data is no longer just the domain of technical personnel (traditionally used for trouble shooting). Log data is no longer just an IT asset and it is a corporate and business asset. It is used extensively by both management and external parties (auditor, forensic investigators) and hence has gained executive level visibility. In this post we look at the new approach to log management.

Continue reading “Log Management and Intelligence-LMI”

An introduction to SOX compliance

Sarbanes Oxley Act also known as SOX was enacted in the year 2002 in the United States in response to various corporate scams. The objective of the enactment has been to protect the shareholders and the general public from accounting errors and fraudulent business practices. The Act is administered by the Securities Exchange Commission and is applicable to public companies.

Continue reading “An introduction to SOX compliance”

A list of major security breaches of 2009

As we begin a new year, I thought it would be a good time to reflect upon some major information security breaches of 2009.   The list of the organizations involved makes this list very  interesting. What makes this list even more interesting is the analysis of the  breach- which indicates that the incidents could have been averted by adopting some fundamental security best practices.

Continue reading “A list of major security breaches of 2009”