Coalfire Appoints Larry Jones to Board of Directors
August 29, 2011, Rick Dakin, CEO, Co-founder and Chief Security Strategist
We are proud to announce the election of Larry Jones to our board of directors. Larry is the former CEO of StarTek, Activant, Message Media and NeoData, and is a seasoned veteran in technology services. He also serves on the board of Comverge, Inc., a publicly traded provider of smart grid, demand management and energy efficiency solutions. Read more
New Guidelines Address PCI DSS Tokenization
August 19, 2011, Bruce DeYoung,
“Tokenization” is one of the best techniques to reduce the risk of credit card data loss. Basically, it is the process of substituting sensitive data with other values not considered sensitive. By doing this, tokenization technology essentially removes anything of value from the data stream, and, after all, what is not there cannot get stolen. This technique can be used with sensitive data of all kinds including financial transactions and medical records.
Cyber Defense Summit 2011
August 16, 2011, John Rostern, VP, Technology Advisory and Assessment Services
On September 14, we will be partnering with InfraGard’s New York City Alliance to host a one-day Cyber Defense Summit. This year we have seen a drastic increase in data breaches. As these hacks have become daily occurrences, enterprises must learn how to protect their data while simultaneously guarding their corporate reputation. Read more
Viruses and Vendors Can Put Healthcare Data At Risk
August 09, 2011, Andrew Hicks, Healthcare and Life Sciences Practice Director
A recent article in Healthcare Security Info highlights that computer viruses can cause security breaches, that can then in turn compromise health care data and potentially violate the HIPAA and HITECH Act regulations. Beth Israel Deaconess Medical Center in Boston had to notify more than 2,000 people that a computer virus sent data, including medical record numbers, names, etc. to an undisclosed location.
Where should CISO report?
July 06, 2011, John Rostern, VP, Technology Advisory and Assessment Services
A key question faced by many organizations in defining the role and responsibilities of the security organization, is where to align the most senior information security executive, (typically referred to as the Chief Information Security Officer or CISO). To answer this question it is important to clearly define the responsibilities of this position and place them in appropriate context.