Information Security Policies Procedures and Guidelines
- June 10, 2010
As expected, Adobe Systems Inc. issued a security bulletin repairing 32 vulnerabilities in Flash Player. Adobe on Thursday released a security bulletin to patch 32 vulnerabilities in Flash Player, ...
- April 21, 2010
A flawed McAfee antivirus update caused Windows XP computers to lose network access and continuously reboot Wednesday. The faulty update caused widespread problems for organizations across the ...
- April 02, 2010
In case you missed it on the SearchSecurity.com home page this week, please check out the first in our latest series of face-off videos, featuring security industry luminaries Hugh Thompson, ...
- March 24, 2010
Compliance with the Federal Information Security Management Act (FISMA) of 2002 has been just that--compliance. Critics rail against it, calling the reg a paperwork drill that has done little to ...
- March 17, 2010
As first reported last week in the The Patriot-News of Pennsylvania and other outlets, Pennsylvania CISO Robert Maley was either fired or resigned under pressure following an appearance at RSA ...
- March 01, 2010
At a press event here on the opening day of the RSA Conference in San Francisco, EMC's security division, RSA, along with Intel and VMWare unveiled a proof of concept for creating secure and ...
- February 09, 2010
Proof-of-concept code released by a security researcher could be tweaked for use on almost any device. Demonstrates need for caution with mobile applications. A security researcher demonstrating ...
- January 04, 2010
Analyst and research firm Securosis announced today that it will merge with Security Incite, the popular blog and analysis site founded by Pragmatic CSO author Mike Rothman. Everything will remain ...
- December 17, 2009
Standard phishing attack targets American Express customers. PandaLabs, the research arm of Panda Security, is warning users about a new phishing scam that attempts to trick people into giving up ...
- December 04, 2009
McAfee’s 3rd Annual “Mapping the Mal Web” report highlights the top-level domains with the most road hazards. Like the auto industry, the Internet wasn’t designed with seatbelts and airbags. It ...
- November 27, 2009
Investigators should question why an external hard drive contained seven years of data, but IT security should have had the appropriate security policies and technologies in place to enforce them.
- November 25, 2009
Sales for certain specialized services depend highly on reputation and trust. Specialized services depend highly on trust and reputation says security guru Bruce Schneier who recently reposted a ...
- November 17, 2009
Report outlines massive affiliate campaigns pushing pharmaceuticals, including counterfeit Tamiflu, making Russian hackers millions. Researchers at security vendor Sophos’ Canadian-based research ...
- October 15, 2009
With so many of the same security problems plaguing organizations year after year, it's time to get tough, a health care security executive suggested Tuesday during a panel discussion at the ...
- September 30, 2009
Security professionals are worried the social network could cause security problems for their companies. CISOs attending Forrester Research Inc.’s security forum held Sept. 10-11 in San Diego must ...