What is a good common approach for encrypted backup/restore on an embedded device?

An embedded device with Linux supports backup/restore of files encrypted with openssl. The idea of backup is: tar -c …. | openssl smime -encrypt -binary -aes-256-cbc -out backupfile.encrypted -outform DER certificate.key and the idea of … Continue reading What is a good common approach for encrypted backup/restore on an embedded device?

Is gamification to encourage increased end user awareness of company security policy a good idea? [closed]

I am a member of the IT security team of a large organization in the financial services industry. I have been with my employer for about 7 years, and am well respected, often serving in advisory capacity to management. Recently we started … Continue reading Is gamification to encourage increased end user awareness of company security policy a good idea? [closed]

Do the organisational policies need to have ownership to ensure accountability?

Policies are the high-level statement from Senior Management. It’s a philosophy for the management to be guided by, and management has the direction to plan, build, run and monitor the activities to achieve the enterprise objectives from t… Continue reading Do the organisational policies need to have ownership to ensure accountability?

Do corporate systems need to be updated immediately after updates are available? [duplicate]

I lived under impression that timely updates were very important. Even a home user wouldn’t like their computer to demand ransom for their data. However, the less home and the more corporate our setting is, security only becomes more, not … Continue reading Do corporate systems need to be updated immediately after updates are available? [duplicate]