Category Archives: Risk Management Strategies

Guidelines for Publishing Information Online

Why is it important to remember that the Internet public? Because the Internet is so accessible and contains a wealth of information, it has become a popular resource for communicating, for researching topics, and for finding information about people. It … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, isecurity, Risk Management Strategies, Software Security Risks, Technology | Tagged , , , , , , , , , , , , | Leave a comment

Risks of File-Sharing Technology

What is file sharing? File sharing involves using technology that allows internet users to share files that are housed on their individual computers. Peer-to-peer (P2P) applications, such as those used to share music files, are some of the most common … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, isecurity, Network Security, Risk Management Strategies, Software Security Risks, Technology | Tagged , , , , , , , | Leave a comment

Google vs. Microsoft vs. Apple: Software Security Risks – Year-End 2011

by Abbas Mirza Dec 26, 2011 2:30 am Google, Microsoft and Apple are constantly engaged in a struggle for industry dominance, competing in software as well as hardware ranging from computers, smart phones and multimedia devices. Meanwhile, the three companies … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Hacked, Information Security, Network Security, Risk Management Strategies, Software Security Risks, Technology | Tagged , , , , , , , , , , , , , , , , , | 2 Comments

Vulnerability test methods for application security assessments

Vulnerability test methods for application security assessments Rohit Sethi and Nish Bhalla, Contributors This scenario may be familiar: Your organization has hundreds or even thousands of applications, but few have received an adequate security assessment, despite a mandate to protect … Continue reading

Posted in Risk Management Strategies | Tagged | 2 Comments