Email Alerts
-
Enterprise botnets contain thousands of malware variants
Smaller and contained on company networks, enterprise botnets pose a greater danger because they are difficult to detect and remove, according to new research. Article | 15 Oct 2009
-
Senators hear call for federal cybersecurity restructuring
Congress is mulling over whether to give more authority on cybersecurity issues to the Department of Homeland Security or create a new office within the White House. Article | 28 Apr 2009
-
Firms muddle security breach response, expert says
Security incident handlers are at the core of the coordination problems during security incidents, says security expert and consultant Lenny Zeltser. Article | 18 Mar 2009
-
Microsoft Conficker worm offers attack prevention lesson
Though a payload hasn't been issued, the Conficker worm reminds security professionals to be actively protecting the network from attacks. Column | 24 Feb 2009
-
IT security pros face challenge during economic crisis
Steven Katz, widely recognized as one of the first CISOs in the security industry, has been keeping an eye on the current financial crisis and company information risk management processes. Katz, a former CISO at Citigroup, JP Morgan and Merrill Lync... Interview | 13 Oct 2008
-
Sound compliance policies, practices reduce legal costs
Results of a recent survey show that if large enterprises adhere to compliance best practices, they can significantly trim what they spend on legal fees. Article | 08 Sep 2008
-
Disaster recovery, security drive financial firm to Private IP
A financial firm picked Private IP to connect branch offices, build a disaster recovery site, and secure customer info. Also, the company will have fewer management headaches. Article | 17 Jan 2008
-
Disaster preparedness: Staying up while everything else is down
A 9/11 survivor offers hard-earned advice to those small businesses hit by disasters like Hurricane Katrina. Article | 17 Jan 2008
-
Business survival 101: How to perform a business impact analysis
A business impact analysis can be a manual that helps your company weather disasters. Here are some pointers on how to put one together. Article | 17 Jan 2008
-
Data breach costs soar
A Ponemon Institute study indicates the costs associated with data breaches have soared and will continue to skyrocket unless companies do more to prevent them in the first place. Article | 29 Nov 2007
Security Management Strategies for the CIO