Entries Tagged as 'Trojan horse'
by Jay Heiser | July 5, 2011 | 1 Comment
I get a never-ending stream of questions that usually amounts to something like “What control tasks do I need to do to be sure that this SaaS service we are going to use will be adequately secure?” Unfortunately, at this point in time, SaaS providers offer relatively little support for enterprise control over anything. Assuming that the […]
Category: Applications Cloud IAM IT Governance risk management security Vendor Contracts Tags: backups, BCP/DR, Cloud, cloud security, continuity, disaster recovery, information security, malware, phishing, Trojan horse, vendor risk
by Jay Heiser | June 7, 2011 | 1 Comment
Back in the days of modems and character-based terminals, it was a normal practice to provide information about the previous login as part of the login sequence. Its time for that past to return to the present.
Category: security Tags: IAM, logins, phishing, SecurID, security, Security-Summit-NA, spyware, Trojan horse
by Jay Heiser | January 27, 2010 | Comments Off
Google’s January 12 blog about their apparently falling victim to a cyberattack of Chinese origin, a cyberonslaught which also targeted several dozen other commercial and defense corporations, has been thoroughly reported on, blogged, and discussed. There will undoubtedly be a lot of valuable lessons–if we ever learn what actually happened. Hopefully, this will increase the […]
Category: Cloud security Tags: cybercrime, espionage, malware, mobile code, PDF, spyware, targeted attack, Trojan horse