Diana Kelley - ALL ARTICLES - PAGE 1

What the Heck is DNSSEC?

February 1, 2011
DNS Security Extensions (DNSSEC) can improve the overall security of DNS, but note that there are some criticisms and caveats before you going running off and planning for full implementation of DNSSEC.
READ MORE

Getting Ready for PCI 2.0 Compliance

January 12, 2011
If your work for an entity that stores, processes, or transmits credit card data in electronic form, you’d better be ready to comply with PCI DSS v2.0, which took effect on January 1, 2011.
READ MORE

Communicating Complex Security Concepts

December 29, 2010
Regardless of what kind of thinker and learner you are, it’s critical to present complex security concepts clearly to ensure maximum communication effectiveness with your audience.
READ MORE

Navigating Smartphone Liability: Corporate Liable v. Individual Liable

December 8, 2010
Personally owned, individual liable converged mobile devices are becoming commonplace in corporate environments and pose unique data protection threats.
READ MORE

Rethinking Privacy and Cloud Computing

November 1, 2010
A predominantly cloud-based architecture is the future for most enterprises. The question is how to best balance privacy and security with cost and business risk.
READ MORE

Four Key IT Security Trends for 2011

October 12, 2010
What the 2010 security acquisition spree by major players, including Symantec, HP, IBM, CA and VeriSign, could mean to IT security professionals.
READ MORE

Why SCADA Security Matters--And What You Should Know About It

September 2, 2010
Worst case scenarios of distributed SCADA attacks include bringing down the power grid to a major metropolitan city, yet most SCADA experts are not security experts--and vice versa.
READ MORE

How to Choose the Right Web Application Firewall (WAF)

August 6, 2010
An exhaustive look at all the ins and outs of shopping for a WAF. Doing the RFP work up-front will help to ensure that your organization gets the right tool for the job. Our expert tells you how.
READ MORE

Three Things the Oil Spill Can Teach Us About Disaster Recovery

June 23, 2010
The BP oil spill is a cautionary tale for businesses that are functioning without proper business continuity and disaster recovery processes and procedures in place.
READ MORE

Buying Guide for Cloud-based E-mail

June 8, 2010
We outline the key considerations for companies looking to make informed, risk-sensitive, purchasing decisions when selecting a cloud-based e-mail solution.
READ MORE

Measuring Software Security: BSIMM2 and Beyond

May 12, 2010
The new BSIMM2 provides the data-driven measurements that allow organizations to objectively assess their software security maturity level against their peers and themselves.
READ MORE

How To Set Social Networking Policies for Employees

April 20, 2010
Establishing a clear set of social networking policies is important to both the security of your business and of your employees.
READ MORE

How to "Green" Security Compliance

March 29, 2010
Security consultant Diana Kelley outlines several key areas where enterprises can “green” their security compliance programs.
READ MORE

Security Vendors Show Innovation at RSA

March 5, 2010
At the RSA Conference this week in San Francisco, some small vendors stood out for their innovative security solutions.
READ MORE

Cloud Computing Takes Center Stage at RSA 2010

March 3, 2010
At RSA, most heads are in the cloud with everyone from Symantec to IBM delivering new cloud-based security solutions.
READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|