Information Security Policies Procedures and Guidelines

  • October 28, 2008 28 Oct'08

    The three-ring security circus

    There's an interesting post on the Wall Street Journal's Business Technology blog today about security vendors resorting to gimmicks and publicity stunts in order to sell more stuff and, allegedly, ...

  • October 06, 2008 06 Oct'08

    Mike Rothman hangs up analyst hat for new vendor job at eIQnetworks

    Things in the security industry are getting curiouser and curiouser. Up is down. Black is white. Cats and dogs are living together. Mike Rothman, a ferociously independent security analyst and ...

  • September 30, 2008 30 Sep'08

    IT security not valued at many firms, study finds

    A study conducted by research firm IDC found that IT security is seen as an obstacle to business innovation.

  • September 29, 2008 29 Sep'08

    Penetration testing without the penetration

    When the subject of penetration testing and security assessments comes up, it usually conjures thoughts of highly skilled consultants deploying an array of custom tools to gather information on a ...

  • September 28, 2008 28 Sep'08

    UCSniff, new VoIP tool, allows sniffing of specific traffic

    After years of hype and mostly unfulfilled promise, VoIP has begun making some headway in large enterprises. A lot of IT managers are attracted by the technology's potential to help them save money ...

  • September 15, 2008 15 Sep'08

    House committee to hear recommendations on cybersecurity for next president

    As the country continues to focus more and more attention on the November election, some security industry insiders are beginning to agitate for more attention to be paid to information security, ...

  • September 11, 2008 11 Sep'08

    Are we more secure seven years later?

    One of the after effects of the terrorist attacks of Sept. 11, 2001, was a hyper-awareness of security of both our physical and digital environments. This has translated into the creation of new ...

  • September 09, 2008 09 Sep'08

    Crypto landmark Bletchley Park in danger of closing without funding boost

    Given the long and mostly distinguished history of the British Empire, the comparatively short life of Bletchley Park barely registers in terms of longevity. But in terms of historical ...

  • September 08, 2008 08 Sep'08

    McAfee rolls back the clock with Artemis cloud security service

    Tech companies are masters at taking an old technology or service, shining it up a bit, giving it a new name and trotting it out as a completely new idea. But it's not often that a company does ...

  • September 03, 2008 03 Sep'08

    Any questions?

    I'm doing two separate podcasts this afternoon with some folks who should be a lot of fun to talk with. The first one is with Paul Roberts, an analyst with The 451 Group who covers security, and ...

  • August 27, 2008 27 Aug'08

    Security-stuffed Internet Explorer 8 beta 2 now available

    Microsoft has just released Internet Explorer 8 beta 2 this afternoon. As I wrote earlier this week, this release of IE is filled to the gills with new privacy and security features, so much so ...

  • August 26, 2008 26 Aug'08

    Microsoft makes privacy a priority in IE 8

    Microsoft is planning to add a significant number of privacy enhancements in Internet Explorer 8, including a new private browsing mode called InPrivate. The list of new features addressing privacy ...

  • August 22, 2008 22 Aug'08

    Intrusions hit Fedora, Red Hat Enterprise Linux servers; some OpenSSH packages compromised

    The maker of Red Hat Enterprise Linux and Fedora said that hackers have gained access to key servers in what appear to be two separate incidents. Red Hat Inc. found last week that someone had ...

  • August 19, 2008 19 Aug'08

    Judge tosses gag order against MIT students

    Every once in a while things work the way should. Not often, but sometimes. Tuesday was one of those times, when a federal judge in Boston threw out the gag order that had prevented three MIT ...

  • August 13, 2008 13 Aug'08

    Russian cyberwar! Yes, no, maybe so?

    The specter of cyber-warfare has been looming over the Internet since its earliest days. Once people figured out that they could send malicious traffic to remote computers, it was only a matter of ...