Information Security Policies Procedures and Guidelines
- September 17, 2009
Attackers are getting better at social engineering because Internet users are ignoring privacy. Attackers have gotten very good at tricking end users into clicking on links to malicious content and ...
- September 16, 2009
A study of 10,000 PCs infected with the Zeus showed that the machines had antivirus installed. The Zeus Trojan has already proven itself to be one nasty piece of malware in its quest for banking ...
- September 14, 2009
Organization announces an open call for papers and presentation proposals for the annual ShmooCon event. The Shmoo Group is soliciting papers and presentations for the sixth annual ShmooCon. The ...
- September 08, 2009
A new survey from Gartner Inc. is confirming what industry analysts and experts have said over the last year and a half: The Security industry is resilient to the tough economy. Gartner is ...
- July 29, 2009
In the opening keynote at the Black Hat USA 2009 conference, a former Google executive urged security pros to stop spending money on technologies that place restrictions on employees and instead empower end users to be security aware.
- June 23, 2009
Former U.S. Congressman Tom Davis, a leading candidate for the White House cybersecurity czar, says the job has a number of major challenges to overcome.
- June 19, 2009
If a major piece of your security strategy revolves around employee training, the following video might be a major setback. Many security pros pride themselves on the amount of training they give ...
- June 08, 2009
Google maps integration looks cool, but in this tough global economy are software vendors going to spend the money needed to pursue offenders? V.i. Laboratories, Inc., is adding Google maps to its ...
- June 02, 2009
The job of critical infrastructure protection must include guidance from the private sector to put best practices to work at the federal level.
- May 29, 2009
The president promised to treat critical infrastructure as a strategic national asset, and that the cybersecurity coordinator would be responsible for orchestrating cybersecurity policy and response to cyberattacks.
- May 01, 2009
Feeling stuffed, sluggish? Oh, it’s not you? It’s your PC suffering from a bad case of AV bloat. How many thousands of antimalware definitions can it take? How many updates? (Remember when your AV ...
- April 23, 2009
These days, you can't log onto Twitter or do a Google search without crashing headfirst into something information security related. Security pros have embraced social networking in a big way, and ...
- April 21, 2009
In his first RSA Conference keynote as Symantec Corp.'s CEO, Enrique Salem made the case for an integrated approach to information security that automates manual processes and provides a better view of security across the enterprise environment.
- April 21, 2009
Instead, Lt. General Keith B. Alexander pushed for a collaborative effort among the intelligence communities, government and private industry to secure cyberspace.
- March 26, 2009
Companies need to spend more time refining security policies to align them with business objectives.