Information Security Policies Procedures and Guidelines
- March 02, 2015
There's no shortage of new security technology, but enterprise integration is still a major hang-up, says AT&T's chief of security.
- February 26, 2015
According to HP Security Research, threat intelligence best practices can be difficult to implement, and even the most trustworthy sources must be tested for fidelity.
- February 25, 2015
Google's Project Zero has added more leeway to its vulnerability disclosure policy, but industry observers are split on whether 90 days is enough time to fix software flaws, or not enough time to manage a sensitive, resource-intensive process.
- January 23, 2015
A Ponemon Institute report highlights the biggest risks to endpoint security, and what IT professionals plan to do to fight back, including one controversial tactic in malware protection.
- January 21, 2015
The Online Trust Alliance finds that over 90% of data breaches resulting in data loss could have been prevented.
- November 14, 2014
News roundup: A recent study revealed IT pros' confidence in implementing basic security measures is high, contradicting data that enterprises consistently fail to thwart basic attacks. Plus: BrowserStack hack lessons; responsible phishing reporting...
- November 10, 2014
Mergers and acquisitions present opportunities for attackers interested in valuable data, but experts say most enterprises fail to perform a network security assessment before proceeding with a deal.
- July 29, 2014
Corporate boards have increased their awareness of security issues, but experts say they still lack information security principles.
- April 22, 2014
The Verizon DBIR 2014 shows that organizations should build a security strategy around industry-specific threats and incident patterns.
- March 26, 2014
The Affordable Care Act introduced a number of infosec issues, but an expert at SecureWorld Boston 2014 said the right mitigations can ease concerns.