Portal:Information Security

From Wikibon

(Difference between revisions)
Jump to: navigation, search
 
(28 intermediate revisions not shown)
Line 1: Line 1:
-
<meta name="description" content="The Wikibon Information Security Research Portal contains information security research, articles, expert opinion, case studies, and company profiles." />
+
<!--|body|-->__NOTOC__
-
<meta name="title" content="Information Security Research Portal" />
+
-
__NOTOC__
+
'''Welcome to the Wikibon Information Security Portal.'''  
-
'''Welcome to Wikibon's Information Security Portal.'''  
+
-
This Portal is a resource for information security practitioners interested in sharing experiences with peers. We welcome you to join Wikibon, browse the portal and participate. You can write a Wikitip, Ask a Question or attend a Peer Incite Research Meeting.
+
-
 
+
-
The Wikibon Information Security Research Portal contains information security research, articles, expert opinion, case studies, and company profiles.
+
 +
The Information Security Portal is a new resource from The Wikibon Project for business and technology professionals interested in learning from peers and sharing knowledge about challenges in the industry, trends, emerging technologies, and best in class practices.
 +
 +
The Wikibon Project invites comments from industry practitioners, technology, services, and content providers on the [http://wikibon.org/wiki/v/2010_Information_Security_Agenda Information Security Agenda: 2010]- common threats faced as global community and the priorities shared by all industry sectors for solutions. The goal of the Wikibon Project is to provide an open, quality peer research and dialog platform, and through this platform, establish industry extensions and interactions that enable a collective effort to advance a common information security agenda for end-users and technologies in 2010 and beyond.
 +
{|
 +
|+
 +
| colspan="2" | <tipoftheday category="Information_Security_Wikitips"/>
 +
 +
[[:Category:Information Security Wikitips |Browse all Information Security Wikitips]]
 +
|+
 +
| width="50%" valign="top" |
===Featured Research===
===Featured Research===
[[Image:Data_Encryption.jpg|250px]]
[[Image:Data_Encryption.jpg|250px]]
-
==[[Data encryption strategies]]==
+
 
-
<p style="color: #666;">As the amount of digital data grows, so does the exposure to data loss. It is difficult to find a day when there hasn’t been a high-profile data security incident. The risk has reached such a level that data encryption is being implemented for stored data and mobile data, in addition to the traditional use of encrypting data in transit via the network.  
+
==[[Data encryption strategies|Data Encryption Strategies]]==
-
  </p>
+
<p style="color: #666;">As the amount of digital data grows, so does the exposure to data loss. It is difficult to find a day when there hasn’t been a high-profile data security incident. The risk has reached such a level that data encryption is being implemented for stored data and mobile data, in addition to the traditional use of encrypting data in transit via the network.  </p>
-
[[Data encryption strategies | read more...]]
+
[[Data encryption strategies|read more...]]
| valign="top" |
| valign="top" |
-
{{Information Security Professional Alerts}}
+
{{Information Security professional alerts}}
|+
|+
| valign="top" |
| valign="top" |
-
===Featured How-To Note===
+
===Featured How-to Note===
[[Image:Storage_Security.jpg|left|250px]]  
[[Image:Storage_Security.jpg|left|250px]]  
|
|
-
==[[Implementing storage network security]]==
+
==[[Implementing storage network security|Implementing Storage Network Security]]==
<p style="color: #666;">In the early days of the computer industry, storage systems were physically large and resided within the confines of a controlled data center environment. Storage systems have evolved into lightweight devices and are easily accessible over corporate networks, making them more vulnerable to security breaches. Fueled by the growing costs of recovering from intrusions, public concerns over privacy and identity theft, and increased government regulations, businesses are spending more time and money to develop or improve storage network security systems.   
<p style="color: #666;">In the early days of the computer industry, storage systems were physically large and resided within the confines of a controlled data center environment. Storage systems have evolved into lightweight devices and are easily accessible over corporate networks, making them more vulnerable to security breaches. Fueled by the growing costs of recovering from intrusions, public concerns over privacy and identity theft, and increased government regulations, businesses are spending more time and money to develop or improve storage network security systems.   
</p>
</p>
-
[[Implementing storage network security | read more...]]
+
[[Implementing storage network security | read more...]]<!--|body|-->
-
[[Category:Information Management wikitips]][[Category: Information Security Wikitips]][[Category: Mobile Enterprise Wikitips]][[Category: Storage security]][[Category: Wikitips]]
+
 
 +
'''Action Item: <!--|actionitem|--><!--|actionitem|-->
 +
 
 +
''Footnotes: <!--|footnotes|--><!--|footnotes|-->
 +
 
 +
[[Category:Information Security Wikitips]][[Category: Mobile Enterprise Wikitips]][[Category: Professional alerts]][[Category: Security]][[Category: Storage]][[Category: Storage asset management]][[Category: Storage professional alerts]][[Category: Storage security]][[Category: Wikitips]]

Current revision as of 20:03, 14 April 2011


Welcome to the Wikibon Information Security Portal.

The Information Security Portal is a new resource from The Wikibon Project for business and technology professionals interested in learning from peers and sharing knowledge about challenges in the industry, trends, emerging technologies, and best in class practices.

The Wikibon Project invites comments from industry practitioners, technology, services, and content providers on the Information Security Agenda: 2010- common threats faced as global community and the priorities shared by all industry sectors for solutions. The goal of the Wikibon Project is to provide an open, quality peer research and dialog platform, and through this platform, establish industry extensions and interactions that enable a collective effort to advance a common information security agenda for end-users and technologies in 2010 and beyond.

Wikitip

RFID for storage media

While the physics of miniaturization have changed all computing devices in the data center, the security-related consequences of smaller and faster are especially problematic for storage media. Tagging and labeling drives, tapes, and other removable media remain necessary for asset management and location, but are hardly sufficient for security. Software that audits change, move, and copy at the bit level is essential to securing storage, but provides minimal help when the data stays on a particular media, but the media moves. RFID technology, in conjunction with the most modern processes for managing package logistics, should be added to the domain of storage media management. Some specialty storage vendors serving specific IT verticals (e.g., health care) are beginning to offer embedded RFID capability. However, to improve storage media tracking, users should start pushing suppliers for RFID-enhanced media across the board. As bit densities increase, it's a design trade-off that makes enormous sense to any business concerned about data moving by foot.


Action Item: RFID technology is too simple and too mature to not be added to data center efforts to physically secure storage media. While the costs of integrating RFID into media packaging may be an important consideration (likely in terms of less data per media), the long-term benefits of being able to more fully secure physical storage media are compelling. We hope storage suppliers provide this feature sooner rather than later.

Footnotes:

View Another Wikitip

Browse all Information Security Wikitips

Featured Research

Data Encryption Strategies

As the amount of digital data grows, so does the exposure to data loss. It is difficult to find a day when there hasn’t been a high-profile data security incident. The risk has reached such a level that data encryption is being implemented for stored data and mobile data, in addition to the traditional use of encrypting data in transit via the network.

read more...

Template:Information Security professional alerts

Featured How-to Note

Implementing Storage Network Security

In the early days of the computer industry, storage systems were physically large and resided within the confines of a controlled data center environment. Storage systems have evolved into lightweight devices and are easily accessible over corporate networks, making them more vulnerable to security breaches. Fueled by the growing costs of recovering from intrusions, public concerns over privacy and identity theft, and increased government regulations, businesses are spending more time and money to develop or improve storage network security systems.

read more...

Action Item:

Footnotes:

Personal tools