Information Security Policies Procedures and Guidelines
- January 31, 2011
The Center for Internet Security's US Cyber Challenge today kicked off an online competition to identify high school students possibly interested in cybersecurity career. The Cyber Foundations ...
- January 27, 2011
It may seem like more mobile hype, but Senior Site Editor Eric B. Parizo writes that there are legitimate reasons why mobile device threats may be on the rise.
- January 13, 2011
Rebranding part of strategy to streamline operations and expand technology portfolio. Web security appliance vendor St. Bernard Software Inc. is renaming itself. The software vendor, which targets ...
- January 05, 2011
Panda Security researchers document the troubling use of fake antivirus software Rogue antivirus first surfaced only four years ago, but today it makes up about 11.6% of all malware, according to ...
- December 16, 2010
Infosec pros got an up-close-and-personal look at advanced attacks in 2010, and Senior Site Editor Eric B. Parizo says without learning from them, many enterprises will fall victim in 2011 as well.
- November 09, 2010
A recent study by Clearswift indicates that companies aren't doing enough to train their workers about Internet security. The Web and email security company conducted a survey of some 2,000 office ...
- October 27, 2010
An all out assault on privacy is taking place and some people are failing to see the problem. Toronto – Many of the people who claim the death of privacy are profiting from it, according to a ...
- October 26, 2010
Juniper Networks on Tuesday unveiled a software suite that company executives touted as the first product to provide integrated security and secure connectivity across all types of mobile devices. ...
- October 21, 2010
IBM is selling professional services, hosted security event and log management technology and a hosted vulnerability management service. IBM announced this week new professional and technology ...
- September 17, 2010
Forrester analyst Khalid Kark said a good information security program starts with a risk assessment.
- July 28, 2010
Rite Aid, the third largest pharmacy chain in the country, agreed to settle government charges that it failed to protect sensitive medical and financial information belonging to its customers and ...
- July 15, 2010
A search for “Mel Gibson tapes” yields plenty of poisoned webpages, according to TrendLabs researchers. People searching for information related to the Mel Gibson controversy will get a startling ...
- June 24, 2010
Many employees are using social networking applications at work and bringing personal devices into the office despite corporate policies, according to a survey released Thursday by Cisco. Fifty-six ...
- June 22, 2010
The research firm argues social networking isn't the responsibility of enterprise information security, but social media governance policies and monitoring practices are important.
- June 21, 2010
Google Enterprise desktop customers praise platform and tout security, privacy features. NATIONAL HARBOR, Md. -- Enterprise information security professionals, by nature, tend to be somewhat ...