Information Security Policies Procedures and Guidelines
- April 05, 2012
BOSTON -- Privacy is a fog rolling in over the land. That’s how Jeff Northrup, IT director of the International Association of Privacy, described personal information privacy during his ...
- March 23, 2012
Cloud outages are always big news - and for good reason, because they usually affect many people. Last month's Microsoft Azure outage was no exception. But at least Microsoft appears to be trying ...
- March 19, 2012
The programming language behind the Duqu Trojan’s command-and-control communications module was written in a custom version of C and compiled with Microsoft Visual Studio 2008—an indication of a ...
- March 15, 2012
Security research firm Securosis has started a series of blog posts about how to protect enterprise data on Apple iOS smartphones. Securosis' Rich Mogull explains that companies are increasingly ...
- March 13, 2012
A look at how information security roles may be impacted by increased adoption of cloud services.
- March 07, 2012
CloudFlare kept LulzSec’s website up for 22 days last summer despite a barrage of attacks.
- March 06, 2012
Traditional antivirus vendors are doing a good job detecting and blocking known mobile malware, according to Av-Test, a Germany-based independent service provider that tests antivirus and ...
- March 01, 2012
A Microsoft Azure outage that affected customers worldwide was apparently triggered by a leap year software glitch. Windows Azure Storage was not impacted.
- March 01, 2012
RSA Conference 2012 panelists discussed court rulings on liability for hacked bank accounts, and gave advice to security pros for protecting financial assets.
- February 28, 2012
RSA’s Arthur Coviello urged security pros to break down silos and intelligence-driven security programs, or face a tough year.
- February 02, 2012
CANCUN, Mexico -- Kaspersky Labs senior security researcher Stefan Tanase knows all about the old adage "You never know until you ask." Tanase conducted an experiment recently where he emailed the ...
- December 06, 2011
Security assessment reviews an organization’s mobile security policies and technologies, evaluating the mobile security posture against a set of 15 core elements. Symantec’s consulting team is ...
- October 18, 2011
Move is part of an industry trend that turns threat intelligence data into actionable information. Symantec is bolstering its DeepSight service and integrating its VeriSign acquisition. The company ...
- October 05, 2011
CAMBRIDGE, MA. -- On the same day consolidation hit the security information and event management market hard, a group of influential industry leaders was busy talking innovation and telling the ...
- September 20, 2011
Companies without a mobile device security policy risk not only losing data, but also running afoul of the law.