Information Security Policies Procedures and Guidelines

  • September 17, 2009 17 Sep'09

    Successful rogue antivirus hinges on social engineering

    Attackers are getting better at social engineering because Internet users are ignoring privacy. Attackers have gotten very good at tricking end users into clicking on links to malicious content and ...

  • September 16, 2009 16 Sep'09

    Zeus Trojan evades antivirus software, Trusteer says

    A study of 10,000 PCs infected with the Zeus showed that the machines had antivirus installed. The Zeus Trojan has already proven itself to be one nasty piece of malware in its quest for banking ...

  • September 14, 2009 14 Sep'09

    ShmooCon soliciting papers

    Organization announces an open call for papers and presentation proposals for the annual ShmooCon event. The Shmoo Group is soliciting papers and presentations for the sixth annual ShmooCon. The ...

  • September 08, 2009 08 Sep'09

    Security industry remains resilient to tough economy

    A new survey from Gartner Inc. is confirming what industry analysts and experts have said over the last year and a half: The Security industry is resilient to the tough economy. Gartner is ...

  • July 29, 2009 29 Jul'09

    Expert: Information security spending often restricts innovation

    In the opening keynote at the Black Hat USA 2009 conference, a former Google executive urged security pros to stop spending money on technologies that place restrictions on employees and instead empower end users to be security aware.

  • June 23, 2009 23 Jun'09

    Cybersecurity czar candidate questions clout of new position

    Former U.S. Congressman Tom Davis, a leading candidate for the White House cybersecurity czar, says the job has a number of major challenges to overcome.

  • June 19, 2009 19 Jun'09

    What is a browser? Video may change your security training strategy

    If a major piece of your security strategy revolves around employee training, the following video might be a major setback. Many security pros pride themselves on the amount of training they give ...

  • June 08, 2009 08 Jun'09

    V.i Labs integrates Google maps to track software piracy

    Google maps integration looks cool, but in this tough global economy are software vendors going to spend the money needed to pursue offenders? V.i. Laboratories, Inc., is adding Google maps to its ...

  • June 02, 2009 02 Jun'09

    WH cybersecurity plan needs private sector guidance

    The job of critical infrastructure protection must include guidance from the private sector to put best practices to work at the federal level.

  • May 29, 2009 29 May'09

    Obama announces creation of cybersecurity coordinator position

    The president promised to treat critical infrastructure as a strategic national asset, and that the cybersecurity coordinator would be responsible for orchestrating cybersecurity policy and response to cyberattacks.

  • May 01, 2009 01 May'09

    Panda goes light on client, heavy into cloud

    Feeling stuffed, sluggish? Oh, it’s not you? It’s your PC suffering from a bad case of AV bloat. How many thousands of antimalware definitions can it take? How many updates? (Remember when your AV ...

  • April 23, 2009 23 Apr'09

    Security bloggers, podcasters get day in sun

    These days, you can't log onto Twitter or do a Google search without crashing headfirst into something information security related. Security pros have embraced social networking in a big way, and ...

  • April 21, 2009 21 Apr'09

    Symantec CEO preaches new security model

    In his first RSA Conference keynote as Symantec Corp.'s CEO, Enrique Salem made the case for an integrated approach to information security that automates manual processes and provides a better view of security across the enterprise environment.

  • April 21, 2009 21 Apr'09

    NSA does not want to run cybersecurity, director says

    Instead, Lt. General Keith B. Alexander pushed for a collaborative effort among the intelligence communities, government and private industry to secure cyberspace.

  • March 26, 2009 26 Mar'09

    Security policies need simplifying, expert says

    Companies need to spend more time refining security policies to align them with business objectives.