Information Security Policies Procedures and Guidelines
- July 29, 2014
Corporate boards have increased their awareness of security issues, but experts say they still lack information security principles.
- April 22, 2014
The Verizon DBIR 2014 shows that organizations should build a security strategy around industry-specific threats and incident patterns.
- March 26, 2014
The Affordable Care Act introduced a number of infosec issues, but an expert at SecureWorld Boston 2014 said the right mitigations can ease concerns.
- March 12, 2014
Veteran CISOs say Target's move to create and fill its CISO role is a good one, but that can't be the end of the Target security program overhaul.
- January 21, 2014
A new survey shows enterprise users are often unaware of secure file-transfer policies, and many organizations make those policies too hard to follow.
- January 16, 2014
With news of more retail breaches imminent, experts say point-of-sale security is just one of many payment-processing infrastructure problems.
- December 23, 2013
The Target data breach highlighted a dirty secret in retail IT: "Holiday IT lockdown" periods that limit security activity put retailers at risk.
- October 22, 2013
Delayed by the government shutdown, the preliminary NIST Cybersecurity Framework offers general best practices for critical infrastructure security.
- September 27, 2013
Ran across the Fortune 1000 Cyber Disclosure Report, published earlier this month by Willis North America, a unit of Willis Group Holdings. The report found that among the Fortune 501-1,000, 22% ...
- August 30, 2013
Out in the last few days is an interesting quarterly update report from McAfee. Topline findings from the second quarter of the year include the following: Banking Malware. Malicious parties employ ...
- August 23, 2013
On a typical Web page, it's possible to load a script from another file. Typically, that bit of script will be something you, the site developer, will have put there yourself and it will be loaded ...
- August 13, 2013
Cyber liability insurance can provide a new layer of security in data breach or exploit situations, study finds.
- July 16, 2013
I'm fairly sure that the folks at Uniqul are serious--they've recently announced a product that uses facial recognition to extract your payments when you buy things. You scan your purchases, it ...
- March 27, 2013
Panelists at the SANS Cyber Threat Intelligence Summit lament the challenges of using cyber-intelligence to thwart enterprise security threats.
- July 26, 2012
It seems the Federal Financial Institutions Examination Council could have done a little better with its cloud computing advisory. Earlier this month, the FFIEC issued a statement on outsourced ...