Information Security Policies Procedures and Guidelines
- October 28, 2008
There's an interesting post on the Wall Street Journal's Business Technology blog today about security vendors resorting to gimmicks and publicity stunts in order to sell more stuff and, allegedly, ...
- October 06, 2008
Things in the security industry are getting curiouser and curiouser. Up is down. Black is white. Cats and dogs are living together. Mike Rothman, a ferociously independent security analyst and ...
- September 30, 2008
A study conducted by research firm IDC found that IT security is seen as an obstacle to business innovation.
- September 29, 2008
When the subject of penetration testing and security assessments comes up, it usually conjures thoughts of highly skilled consultants deploying an array of custom tools to gather information on a ...
- September 28, 2008
After years of hype and mostly unfulfilled promise, VoIP has begun making some headway in large enterprises. A lot of IT managers are attracted by the technology's potential to help them save money ...
- September 15, 2008
As the country continues to focus more and more attention on the November election, some security industry insiders are beginning to agitate for more attention to be paid to information security, ...
- September 11, 2008
One of the after effects of the terrorist attacks of Sept. 11, 2001, was a hyper-awareness of security of both our physical and digital environments. This has translated into the creation of new ...
- September 09, 2008
Given the long and mostly distinguished history of the British Empire, the comparatively short life of Bletchley Park barely registers in terms of longevity. But in terms of historical ...
- September 08, 2008
Tech companies are masters at taking an old technology or service, shining it up a bit, giving it a new name and trotting it out as a completely new idea. But it's not often that a company does ...
- September 03, 2008
I'm doing two separate podcasts this afternoon with some folks who should be a lot of fun to talk with. The first one is with Paul Roberts, an analyst with The 451 Group who covers security, and ...
- August 27, 2008
Microsoft has just released Internet Explorer 8 beta 2 this afternoon. As I wrote earlier this week, this release of IE is filled to the gills with new privacy and security features, so much so ...
- August 26, 2008
Microsoft is planning to add a significant number of privacy enhancements in Internet Explorer 8, including a new private browsing mode called InPrivate. The list of new features addressing privacy ...
- August 22, 2008
The maker of Red Hat Enterprise Linux and Fedora said that hackers have gained access to key servers in what appear to be two separate incidents. Red Hat Inc. found last week that someone had ...
- August 19, 2008
Every once in a while things work the way should. Not often, but sometimes. Tuesday was one of those times, when a federal judge in Boston threw out the gag order that had prevented three MIT ...
- August 13, 2008
The specter of cyber-warfare has been looming over the Internet since its earliest days. Once people figured out that they could send malicious traffic to remote computers, it was only a matter of ...