Quantcast
Channel: Payment Card Security & IT Controls Explained » james deluccia
Browsing latest articles
Browse All 37 View Live

Image may be NSFW.
Clik here to view.

Information Security executives … is responsibility being abdicated?

Is “it is your decision not ours” statement and philosophy a cop-out within the Information Security sphere? This is a common refrain and frustration I hear across the world of information security and...

View Article



Image may be NSFW.
Clik here to view.

What do major developments in big data, cloud, mobile, and social media mean?...

Tuesday afternoon the CISO-T18 – Mega-Trends in Information Risk Management for 2013 and Beyond: CISO Views session as presented focused on the results of a survey sponsored by RSA (link below).  It...

View Article

Image may be NSFW.
Clik here to view.

Big Data is in early maturity stages, and could learn greatly from Infosec...

The concept of analysing large data sets, crossing data sets, and seeking the emergence of new insights and better clarity is a constant pursuit of Big Data. Given the volumn of data being produced by...

View Article

Image may be NSFW.
Clik here to view.

Methodology for the identification of critical connected infrastructure and...

ENISA released a study with a methodology identifying critical infrastructure in communication networks. While this is important and valuable as a topic, I dove into this study for a particularly...

View Article

Image may be NSFW.
Clik here to view.

Mapping the Startup Maturity Framework to flexible information security...

After over a decade of working with startups, private equity, and over the last 5 years of deep big 4 client services acting in different executive roles (CISO, CIO Advisor, Board of Directors support)...

View Article


Image may be NSFW.
Clik here to view.

FedRamp on the Cloud: AWS Architecture and Security Recommendations

In December Amazon released a nice guide with architecture layouts + tips across the NIST 800-53 standard. This is an important tool for ANY business looking to accelerate their operations into a...

View Article

Image may be NSFW.
Clik here to view.

Moving forward: Who cared about encrypted phone calls to begin with…The Great...

TOP-SECRET GCHQ documents reveal that the intelligence agencies accessed the email and Facebook accounts of engineers and other employees of major telecom corporations and SIM card manufacturers in an...

View Article

Image may be NSFW.
Clik here to view.

1,600 Security Badges Missing From ATL Airport in 2 yr period – NBC News

While not a complicated or strategic topic that I would normally highlight, this one bit of news is from my home airport and personally meaningful. Basically the report shows that 1,600 badges were...

View Article


Image may be NSFW.
Clik here to view.

Bored w/ Security warnings? MRIs show our brains shutting down when we see...

Ever find yourself just click click clicking through every message box that pops up? Most people click through a warning (which in the land of Web Browsers usually means STOP DON’T GO THERE!!) in less...

View Article


Image may be NSFW.
Clik here to view.

Russians used non-public exploits to hack governments; Debunking: skill vs....

Organizations being hacked is not always the result of superior adversary, but more often than not (I think the figure is closer to 85% defender mistakes vs. 15% “very skilled) the result of poor...

View Article
Browsing latest articles
Browse All 37 View Live




Latest Images