-
Why execs really need corporate security training
Senior executives may be the most likely to disobey all your hard-won corporate security training. Here are five reasons why.31 May 2012
-
Cybersecurity information sharing initiatives on the rise
Businesses and government agencies work to improve sharing of cyberthreat information.30 May 2012
-
Challenges with data protection in the cloud
Capabilities such as encryption and DLP can be complicated in the cloud.30 May 2012
-
Security information management systems and application monitoring
SIMs aren’t just for network monitoring anymore.30 May 2012
-
CISPA cybersecurity legislation wins industry support
Legislation designed to provide the federal government with threat data from the private sector gains steam.30 May 2012
-
Reporter notebook: SCADA security, Oracle vulnerability, SQL Slammer
Reflections on the ICS CERT alert, Oracle’s handling of a zero-day and more.30 May 2012
-
Marcus Ranum chat: Software development practices and security
Security expert Marcus Ranum talks with Brian Chess, formerly of HP, about coding practices and security.30 May 2012
-
Information security threats: Building risk resilience
Enterprises need an agile risk management strategy to deal with today’s evolving threats.30 May 2012
-
Kaspersky Flame malware poses little threat to businesses
Flame, a package of components commonly available in most banking Trojans and remote access toolkits, is detectable by current antivirus, experts say.30 May 2012
-
CISOs struggle with visibility, complexity in enterprise risk management
McAfee says organizations must juggle visibility, system complexity challenges when balancing compliance-driven priorities with the threat landscape.29 May 2012
-
The Flame malware fuels discussion on cyberwarfare threats
A sophisticated malware toolkit has targeted Iran, Lebanon, Syria, Sudan and Israel, and is believed to be part of a cyberespionage operation.29 May 2012
-
Does BEAST SSL tool represent an SSL threat?
Expert Nick Lewis analyzes the potential SSL threat that the BEAST SSL tool poses and discusses whether enterprises should be concerned.29 May 2012
-
P2P encryption for mobile is not an technology endorsement, says PCI Council
The PCI Council will continue to issue recommendations for mobile payment security, according to Bob Russo, general manager of the PCI SSC.25 May 2012
-
Revisiting JRE security policy amid new ways to exploit Java
Expert Nick Lewis analyzes the increasing ability by hackers to exploit Java and the need to perform a JRE security policy analysis in response.25 May 2012
-
Oracle security patches, InfoSec World 2012 controversy offer important lessons
Editor Eric B. Parizo says controversies involving Oracle security patches and InfoSec World 2012 prove the importance of differing opinions.24 May 2012
-
Can XML encryption thwart XML attacks?
Expert Nick Lewis discusses proof-of-concept XML attacks and possible steps for defending data protected by XML encryption.24 May 2012
-
Hot security storylines offer unconventional wisdom
Editor Eric B. Parizo says controversies involving Oracle security patches and InfoSec World 2012 prove the importance of differing opinions.24 May 2012
-
A bold view on prioritizing computer security laws
The number of computer security laws in the U.S. can be daunting. One bold lawyer suggests a way to prioritize the laws and avoid most legal battles.24 May 2012
-
Technology raises visibility of partner networks
Lookingglass shines a light on the security posture of an enterprise’s partners, clients and third-party providers.24 May 2012
-
Screencast: Employ the FOCA tool as a metadata extractor
Mike McLaughlin demos the FOCA tool as a metadata extractor to expose the 'hidden' data users often post on their own websites.24 May 2012
Security Management Strategies for the CIO