Does DoD-Level Security Work in the Real World?

I began my career in Information Security working for the Department of Defense, first for a Naval research facility, then Naval Intelligence, and finally with the National Security Agency. Information security for my first assignment meant locking your classified materials in a safe when you left the office at night and making sure the office […]… Read More

The post Does DoD-Level Security Work in the Real World? appeared first on The State of Security.

Continue reading Does DoD-Level Security Work in the Real World?

Does DoD-Level Security Work in the Real World?

I began my career in Information Security working for the Department of Defense, first for a Naval research facility, then Naval Intelligence, and finally with the National Security Agency. Information security for my first assignment meant locking your classified materials in a safe when you left the office at night and making sure the office […]… Read More

The post Does DoD-Level Security Work in the Real World? appeared first on The State of Security.

Continue reading Does DoD-Level Security Work in the Real World?

How to Ensure the Success of a Hot Desking Strategy

A hot desking strategy allows employees to sit wherever they want, creating more flexibility for workers and more complexity for IT managers.

The post How to Ensure the Success of a Hot Desking Strategy appeared first on Security Intelligence.

Continue reading How to Ensure the Success of a Hot Desking Strategy

Subtlety Is the Danger for Cybercrime Security Efforts

With threats coming from all sides, it’s easy for IT professionals to forget that cybercrime can take many unsophisticated forms.

The post Subtlety Is the Danger for Cybercrime Security Efforts appeared first on Security Intelligence.

Continue reading Subtlety Is the Danger for Cybercrime Security Efforts