-
Perimeter defenses deemed ineffective against modern security threats
Targeted attacks like Operation Aurora require organizations to change up their security strategy, experts say30 Jun 2010
-
Web 2.0 widgets: Enterprise protection for Web add-ons
Web 2.0 widgets represent a threat vector that should not be overlooked at any enterprise organization. In this tip, Nick Lewis explains what a Web 2.0 widget is, and how companies can protect agai...30 Jun 2010
-
HIPAA covered entity and business associate agreement requirements
Under HITECH, both "covered entities" and "business associates" must comply with HIPAA data protection mandates, but, as a covered entity, what's the best way both to maintain compliance for your o...30 Jun 2010
-
SIEM market overview: Gartner's Mark Nicolett
Gartner VP and distinguished analyst Mark Nicolett discusses SIEM vendor consolidation, the myth that SIEM is a cost-saving effort and more.29 Jun 2010
-
Critical Adobe Reader, Acrobat update due today
A critical, out-of-cycle patch is set to repair a serious flash vulnerability in the software that is being actively targeted by attackers.29 Jun 2010
-
HIPAA business associate
As defined by the Health Information Portability and Accountability Act (HIPAA), a business associate is any organization or person working in association with or providing services to a covered en...28 Jun 2010
-
Free port scan: How to use Angry IP scanner
Scanning IP ports is a critical part of maintaining enterprise information security. In this screencast, Peter Giannoulis explains how to use the free tool Angry IP scanner for these port scans.28 Jun 2010
-
Secure Web gateway success hinges on one key feature
The CISO for the city of Portland, Ore., advises that every enterprise be aware of one must-have secure Web gateway feature before buying.25 Jun 2010
-
VB2010 Vancouver
25 Jun 2010
-
The future of hacking: Dealing with the underground economy
How is the underground economy evolving, and what can security practitioners do to anticipate and respond to future threats? In this Face-off video, Hugh Thompson and Adam Shostack discuss the best...24 Jun 2010
-
Twitter settles with FTC over security issues, careless policies
In the federal agency's first case against a social networking service, Twitter agreed to periodic third-party reviews of its security program over the next decade.24 Jun 2010
-
Gartner: Windows 7 security features have strings attached
Many of the software giant's highly touted security features cost extra to get, require additional Microsoft products to run and lag behind third-party vendors.24 Jun 2010
-
USB thumb drive security best practices spelled out by NIST
The National Institute of Standards and Technology's own policies and technical requirements on USB thumb drive security furnish other federal agencies with a de facto set of best practices.23 Jun 2010
-
Tokenization vs encryption: RSA touts tokens to reduce PCI DSS pain
Payment industry executives and security experts are currently debating over the right way to preserve and protect credit card data. Merchants can choose between a variety of formats, from format preserving...23 Jun 2010
-
How to set up Apache Web server access control
If you're hoping to allow or deny Apache Web server access based on IP address, check out this expert response from Randall Gamby.22 Jun 2010
-
Gartner: Enterprises must learn to detect botnet threats
Botnets will be a major problem for at least the next two years and key cloud computing and virtualization security decisions could determine the outcome of future attacks.22 Jun 2010
-
Gartner: Companies shouldn't bother banning Facebook, social networking
The research firm argues social networking isn't the responsibility of enterprise information security, but social media governance policies and monitoring practices are important.22 Jun 2010
-
PCI Standards to be updated on new three-year cycle
The PCI Security Standards Council will update the PCI Data Security Standard on a new three-year cycle after the latest update is applied in October.22 Jun 2010
-
Trustwave buys Breach Security for WAF technology
Trustwave said it would integrate Breach's Web application firewall into its pen-testing and code-review services. The vendor says it's committed to ModSecurity.22 Jun 2010
-
Adobe focuses on secure software development lifecycle
With its popular software increasingly targeted by hackers, Adobe has stepped up efforts to secure its applications.22 Jun 2010
Security Management Strategies for the CIO