Information Security Policies Procedures and Guidelines
- April 23, 2015
At a roundtable discussion at RSA Conference 2015, security admins pondered what to do about bloated security portfolios.
- April 22, 2015
Cyberliability insurance gains popularity as industry experts warn that, contrary to popular belief, general insurance won't protect against cyberattacks.
- April 22, 2015
At RSA 2015, former federal officials called for better government cybersecurity cooperation between agencies and with the private sector.
- April 09, 2015
Enterprises may be increasingly aware of insider threats and believe they can find and stop them, but a new SANS Institute survey suggests they may be overconfident and lack the necessary insider threat-detection technology.
- April 03, 2015
Whether or not you think Bitcoin has a future, it has a couple of very interesting technological elements that will probably have a life of their own. The aspect that everyone talks about is that ...
- March 02, 2015
There's no shortage of new security technology, but enterprise integration is still a major hang-up, says AT&T's chief of security.
- February 26, 2015
According to HP Security Research, threat intelligence best practices can be difficult to implement, and even the most trustworthy sources must be tested for fidelity.
- February 25, 2015
Google's Project Zero has added more leeway to its vulnerability disclosure policy, but industry observers are split on whether 90 days is enough time to fix software flaws, or not enough time to manage a sensitive, resource-intensive process.
- February 18, 2015
A lot of what went on at the White House Summit on Cybersecurity and Consumer Protection, held at Stanford University last week was for show — a reaction in particular to the attacks allegedly ...
- February 13, 2015
Though I’ll admit to a bit of skepticism about Runtime Application Self Protection (RASP), I was nevertheless impressed with a recent look at Prevoty. The two-year-old company’s product, which ...
- January 23, 2015
A Ponemon Institute report highlights the biggest risks to endpoint security, and what IT professionals plan to do to fight back, including one controversial tactic in malware protection.
- January 21, 2015
The Online Trust Alliance finds that over 90% of data breaches resulting in data loss could have been prevented.
- November 14, 2014
News roundup: A recent study revealed IT pros' confidence in implementing basic security measures is high, contradicting data that enterprises consistently fail to thwart basic attacks. Plus: BrowserStack hack lessons; responsible phishing reporting...
- November 10, 2014
Mergers and acquisitions present opportunities for attackers interested in valuable data, but experts say most enterprises fail to perform a network security assessment before proceeding with a deal.
- July 29, 2014
Corporate boards have increased their awareness of security issues, but experts say they still lack information security principles.