Call us at 507.319.5206 or This email address is being protected from spambots. You need JavaScript enabled to view it.
Follow us on LinkedIn and Twitter

Botz Security Bytes Newsletter — January 2015

BOTZ

 


 SECURITY BYTES


   Solving information security problems                           January 2015

Home     |      SSO Services      |      Security Consulting      |       Downloads     |      Contact      

 

How to Calculate ROI for a Single

 

Sign-On Project

 

Calculate ROIJanuary 20, 2015 — So you’re interested in implementing single sign-on. You know that everybody, including management, will love it.

 

But that doesn’t mean that management will give you a blank check to implement it.

 

Like any security project, they expect you to make a business case for SSO.

 

Several years ago I engaged the services of an MBA to help me build a management-worthy ROI calculator for single sign-on projects. I wanted to make sure that all of the assumptions and formulas would stand up to the scrutiny of even the most .....

 

Read more...



 

Calculating the Real Cost of

 

Security Projects

 

Hidden CostsInformation security is first and foremost a business issue.

 

As IT professionals, we need to analyze the merits of any security project based on how much the investment will benefit the organization.

 

To perform this analysis, you need to determine the size of the investment — in terms of monetary cost — and the amount of time for the investment to pay for.....

 

Read more...


 


Not your copy? 
Don't miss an issue!  Subscribe here...

 
 

 

RCAC & Compliance

Revisit one of our most popular blog posts from 2014 — Cool New "Row Column Access Control" Makes Compliance Easier.
Read about RCAC...

 

Top Security News

 

N.S.A. Tapped Into North Korean Networks Before Sony Attack 
I wondered if this wasn't the case when non-NSA experts were questioning whether the attack was North Korean based. I figured the government must have had other evidence that it couldn't or wouldn't make public. This article seems to suggest that may have been the case. 
Read more...
 

CryptoWall: Don't Let the Bad Guys Encrypt Your Data
You may have heard about malware or ransomware that encrypts your computer disk and then forces you to pay money to get it unencrypted. This is a concise article with a couple of useful tips to help you avoid being a victim.
Read more...
 

The World's Oldest 'Computer' is Even Older
The Antikythera Mechanism is apparently even older than first thought.
Read more...
 

Research Shows CISOs Gaining Influence Even as Challenges Mount
Story about IBM's third annual CISO Assessment. The results aren't that surprising given the number and size of breaches last year alone. But the data is still interesting. 
Read more...
 

 

BOTZ & Associates, Inc.    |    Rochester, MN 55903    |    1.507.319.5206    |    This email address is being protected from spambots. You need JavaScript enabled to view it.