Security Bytes

March 2008

Information security policies, procedures and guidelines

  • How to ask a VC for money

    David Schneier - R.I.S.C. Associates 14 Mar 2008
  • I'm listening to a panel discussion right now featuring six former members of the L0pht hacking collective and Mudge, perhaps the most famous member of the group, just told a great story about the ...

  • Trend Micro site compromised

    Leigha Cardwell - TechTarget 14 Mar 2008
  • The last thing a person expects is to have their computer exposed to malware during a visit to a security vendor's website. But those visiting the site of Tokyo-based Trend Micro may have ...

  • The wit and wisdom of Dan Geer

    David Schneier - R.I.S.C. Associates 13 Mar 2008
  • Here's a mindbender for you: Not only have all of the security products that we've installed on our desktops and servers not made those machines secure, they have, in fact, made them less secure. ...

  • Virtualization, cloud computing and the race to deploy

    David Schneier - R.I.S.C. Associates 12 Mar 2008
  • To answer my own question from the earlier post on the Source conference, yes, it has turned out to be a really useful conference so far. The most interesting talk so far has been the Rich ...

  • Chevron security chief: Get creative

    Marcia Savage - Editor 07 Mar 2008
  • If security executives want a seat at the table or leverage the one they have, they need to get creative. That was the message Chevron Chief Information Protection Officer Richard Jackson delivered ...

  • Microsoft releases beta for Internet Explorer 8

    Leigha Cardwell - TechTarget 06 Mar 2008
  • Beta testers in the security blogosphere have a new toy to salivate over -- the first beta release of Microsoft Internet Explorer 8 (IE 8). The software giant said IE 8 can be installed on Windows ...