-
Cybersecurity hearing highlights inadequacy of PCI DSS
Lawmakers call the PCI standard lacking and seek significant improvements to the payment processing infrastructure to enhance security.31 Mar 2009
-
How to detect keyloggers
In this expert response, Michael Cobb explains how to detect the many rootkits available to today's attackers.31 Mar 2009
-
What are the key provisions of Massachusetts Executive Order 412?
Agencies must now give their full cooperation to the Massachusetts Information Technology Division (ITD), which has been given more control over IT spending. Michael Cobb reviews Massachusetts' Exe...31 Mar 2009
-
Mass., Nev. data protection laws wrong, ineffective
Government should consider extending existing frameworks for fraud, trespassing and trafficking across state and national borders, not legislating technology, explains Eric Ogren.31 Mar 2009
-
How to create configuration management plans to install DLP
Installing DLP products on a network can require a lot of configuration management planning that includes cooperation between many business groups. In this security management expert response, lear...31 Mar 2009
-
Data security best practices for PCI DSS compliance
The glut of recent data breaches, such as the one at Heartland Payment Systems Inc., leaves some security pros wondering if PCI DSS is doing its job. Is it worth all the effort to become PCI compli...31 Mar 2009
-
Conficker flaw yields new tool for detection
A flaw in the way Conficker infects machines has given security experts the ability to design a new tool to remotely detect infections over the network.30 Mar 2009
-
Microsoft calls next Conficker variant 'manageable'
The next version of Conficker expected April 1, should be treated like any other malware attack, Microsoft said in a message to customers.30 Mar 2009
-
Firefox update blocks proof-of-concept code
Mozilla updated Firefox to repair several flaws, including a critical zero-day flaw.30 Mar 2009
-
How to set up a corporate cell phone management strategy
Mobile devices are ubiquitous in today's enterprise environments, but how can security pros keep them from becoming malware-laden, data-leaking devices? In this expert response, Mike Chapple gives ...30 Mar 2009
-
Maltego demo: Identifying a website's trust relationships
This month, Peter Giannoulis of TheAcademyPro.com and TheAcademyHome.com demonstrates Maltego, an information-gathering tool that infosec pros can use to assist with vulnerability assessments and p...30 Mar 2009
-
OWASP Security Spending Benchmarks Project
An OWASP project investigates company spending on software development. A survey found a majority of firms getting an independent third-party security review of software code.27 Mar 2009
-
Economy fuels malware, spam
Dave Marcus of McAfee's Avert Labs, breaks down the threat landscape and explains why spam numbers are rising and malware writers are taking advantage of the down economy.27 Mar 2009
-
Security policies need simplifying, expert says
Companies need to spend more time refining security policies to align them with business objectives.26 Mar 2009
-
eBook: Virtualization Security
Space savings and reductions in energy costs are causing more organizations to move, or at least consider the move, to virtual environments. Download this eBook and discover how to mitigate the inh...25 Mar 2009
-
Vulnerability test methods for application security assessments
Learn what to do when you have a huge portfolio of potentially insecure applications, limited resources and an overwhelming sense of urgency.25 Mar 2009
-
Microsoft IE 8 security only benefits educated users
New productivity and security features of Internet Explorer (IE) 8 might require end users get a lesson from IT staff before companies can fully benefit.25 Mar 2009
-
eBook: Encryption 360 Degrees
Data breaches and regulatory mandates are fueling the exploding interest in encryption. This exclusive eBook evaluates today's encryption technologies from all angles and projects trends throughou...25 Mar 2009
-
eBook: Understanding GRC
This in depth eBook explores all facets of GRC from the complexities of evaluating the right solution for your organization to implementing governance frameworks. Download this exclusive resource ...25 Mar 2009
-
HP patches critical OpenView flaws
The remote network software contains flaws that could be exploited to gain access to critical files.24 Mar 2009
Security Management Strategies for the CIO