Blogs

Showing Blog Posts: 1–6 of 6 by David Wallace

  • Security Metrics You Should Be Watching for New Insights

    by David Wallace on June 30, 2014

    It's been more than 15 years since my identity, bank account, and credit history were taken hostage by some folks in the Bronx. By one set of security metrics, last year was a good year because there was no repeat failure. I've used "fraud alerts" on accounts to notify me in case of improper activity and been vigilant about credit reports and monitoring FICO scores, but I don't know if I'm any…

  • Customer Data Cleanup in Aisle Four: Are You Helping YOUR Clients?

    by David Wallace on May 30, 2014

    If your personal data and credit account details were stolen recently, your choice is basically to get another card or start paying for things with cash. For companies, retaining clients means winning back trust. While banks, store chains, and credit card processors point fingers at each other, shoppers can only mop up the leak and hope there's no long-term harm to credit scores or financing. …

  • Enterprise IT Virtualization Makes Security a Harsh Reality

    by David Wallace on May 15, 2014

    Enterprise IT virtualization is a multi-syllable way of saying "software in the cloud," and companies are finding that its benefits are real—but so are its challenges. The same selling points that attract users—budget savings, the convenience of working from anywhere, and the elimination of software service updates and incompatibilities—also create headaches for IT help desks and CIOs. The…

  • As Companies Get Social, Network Security Grows

    by David Wallace on April 8, 2014

    "As long as it happens to someone else" is a key part of data protection and network security. Deter the bad guys long enough and they'll go looking for a weaker target. Social and personal connections can help immensely with daily work but make for scary nightmares. The IT department can "MacGyver" systems to guard against technical leaks or intrusion, but then they have to hope that humans…

  • Secure Global Open Source Calling and Message Tools

    by David Wallace on March 25, 2014

    Risk versus reward? Open source versus packaged? Security or flexibility? All of these decisions matter deeply when considering personal safety for international travelers. Because today's cell phones send a signal beacon that identifies your location, network, and movement, companies are turning to more secure open source applications to protect phone conversations and hide the email trail in…

  • Security Assessment From the Outside-In

    by David Wallace on March 20, 2014

    Outside-In security starts with realizing that your company or organization doesn't have all the answers. The Internet is a big place, and the World Wide Web is just one part of it. Connected mobile devices and appliances are expanding their reach every day, and with it, the complexity of a security assessment. Importance of Security Assessments Your people rely on personal devices and…

This document was retrieved from http://www.rsaconference.com/blogs/by/115/wallace on Sat, 26 Jul 2014 05:08:53 -0400.
© 2014 EMC Corporation. All rights reserved.