Email Alerts
-
Sony attack: Sony expands scope of its massive data security breach
Sony executives said an attack on its PlayStation Network systems, also exposed the data of 24.6 million users at its Online Entertainment division. News | 03 May 2011
-
Eye On: Secure Software Development
This special report explores software security: reducing vulnerabilities and improving development processes. Article | 21 Apr 2011
-
Ignoring mobile hype? Don't overlook growing mobile device threats
It may seem like more mobile hype, but Senior Site Editor Eric B. Parizo writes that there are legitimate reasons why mobile device threats may be on the rise. Column | 27 Jan 2011
-
Information security 2011: Next-gen threats demand layered defense
Infosec pros got an up-close-and-personal look at advanced attacks in 2010, and Senior Site Editor Eric B. Parizo says without learning from them, many enterprises will fall victim in 2011 as well. Column | 16 Dec 2010
-
Forrester: The simple, two-year plan for security program maturity
Forrester analyst Khalid Kark said a good information security program starts with a risk assessment. Article | 17 Sep 2010
-
Gartner: Companies shouldn't bother banning Facebook, social networking
The research firm argues social networking isn't the responsibility of enterprise information security, but social media governance policies and monitoring practices are important. Article | 22 Jun 2010
-
Health Net breach failure of security policy, technology
Investigators should question why an external hard drive contained seven years of data, but IT security should have had the appropriate security policies and technologies in place to enforce them. Column | 27 Nov 2009
-
Expert: Information security spending often restricts innovation
In the opening keynote at the Black Hat USA 2009 conference, a former Google executive urged security pros to stop spending money on technologies that place restrictions on employees and instead empower end users to be security aware. Article | 29 Jul 2009
-
Cybersecurity czar candidate questions clout of new position
Former U.S. Congressman Tom Davis, a leading candidate for the White House cybersecurity czar, says the job has a number of major challenges to overcome. Article | 23 Jun 2009
-
WH cybersecurity plan needs private sector guidance
The job of critical infrastructure protection must include guidance from the private sector to put best practices to work at the federal level. Column | 02 Jun 2009
Security Management Strategies for the CIO