You are viewing 'it security'

The Story of Theft Season (A Holiday Jingle)

‘Twas 12 Days Before Theft Season

Ramece Cave

December 22, 2016 - Posted by Ramece Cave to Security Insight

‘Twas 12 days before Theft Season, when all through the smart house,
Not a device was active, not even an IoT mouse.
The device that you bought from a random seller online,
That shipped from far-far away, had arrived in due time.

It was the gift that she begged for, pleaded and wined,
The one that she pined for, for six months’ time.
Not finding the original, this knock-off will do,
She must be happy, she is my princess; what would you do?

Being the perfect Dad, and wanting things right,
You plugged it in and charged it forthright.
Manuals read, it was ready to go,
But little did you know, this was only the beginning of the show.

As visions of your princess’ happiness lead you to a sound slumber,
The process was the first day of 12 days of havoc, 12 days of plunder.
The fiendish, deceitful, treacherous crew,
Of malicious actors, cleverly deceived you.

Their... read more >

Problem Management

Why problem management is important to security

Matt Ireland

October 06, 2016 - Posted by Matt Ireland to Security Insight

Cyber Attacks

Well, it is now official; I am writing my first blog post. As the Regional Chief Information Security Officer for the Americas here at NTT Security, I felt it important to share with you a perspective that I have gained from my extensive experience with information and physical security, combined with my recent experience with the Information Technology Infrastructure Library (ITIL), and more specifically problem management. ITIL defines problem management as “The process responsible for managing the lifecycle of all problems. Problem management proactively prevents incidents from happening and minimizes the impact of incidents that cannot be prevented” (Steinberg, Rudd, Lacy, and Hanna, 2011). Well, then, what is a problem defined as? ITIL would tell us that a problem is “a cause of one or more incidents. The cause is not usually known at the time a problem record is created, and the problem management process is responsible for further investigation”... read more >

Advancing Information Security Knowledge: Part 2

Learning from a Mentor

Bryan Pluta

July 21, 2016 - Posted by Bryan Pluta to Security Insight

Board Meeting

In information security, there are so many career niches, so many new information security topics and technologies and so many evolving cyberattacks and breaches. To keep up with the rapidly changing information security field, you can never stop learning. One fantastic method to become more educated is to find a mentor.

How do you find a good mentor?

A good mentor is someone who has patience and is able to explain complex topics in a multitude of different ways to ensure everyone is able to understand. One of the best places to look for a mentor is at your current place of employment. Many people have senior individuals where they are employed that have been in the field for years and can explain highly complex topics. If there is a senior person where you work, try asking them if you can shadow them when they perform specific tasks that you want to learn more about. You can also ask if they can set aside time on a weekly or monthly... read more >

Advancing Information Security Knowledge: Part 1

Becoming a Mentor

Bryan Pluta

July 14, 2016 - Posted by Bryan Pluta to Security Insight

Mentors

Over the last couple of weeks, I have become more involved with training and education as it relates to the information security realm. Finding myself thinking more and more about the need for advancing information security knowledge, I've realized how important becoming a cyber security mentor is to those in need.

Those of us who are more senior and have deep expertise and firm grasp on the concepts and practices relating to information security, have the ability to help others in our field. By becoming a mentor, you can share your security knowledge, help others learn and develop their own skills, create a larger population of skilled people, and ultimately help advance the overall knowledge level in the field.

Mentoring works because it lets one learn from the other person’s successes and – yes – failures. Being a mentor can take a formal route. You can, for example, be an instructor at a college, university, or technical school. You... read more >

Prevention Blog Series

Partner With Your Security Provider: A Fourth Step in Security

Loren Paquette

May 12, 2016 - Posted by Loren Paquette to Security Insight

Ounce of Prevention

I remember back in the day sitting in a classroom. The teacher would tell us to pick a partner and so we did. We picked our friend, or the person next to us, or the classroom dreamboat. It was simple then, because it wasn’t a terribly difficult task to complete.

As we got older, and hopefully wiser, we were asked to pick a partner to complete a task. This time, with more education behind us, we wanted a teammate that could help us complete the task the best. In other words, we wanted to win.

Security Partners want to help you win when securing your environment.

Through a process (whatever it may have been for your organization), you picked your security partner. There are some things you will need to take on together in order to get the best end result. Your partner needs to have the same information you have about your network. This allows a proper customized experience for your specific company and needs. A one-size-fits-all solution doesn’t work as... read more >

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | Older Entries >>

Voted one of the Best Computer Security Blogs 2016
NTT Security (US), Inc. (formerly Solutionary) is a security consulting and managed security services provider. The NTT Security blog is a place for IT professionals to both learn and talk about the latest in IT security and compliance.

Get the NTT Security Blog delivered to your inbox!

Enter your Email:

(We will not share your email or use it for anything else.)

LATEST TWEETS