Information Security Policies Procedures and Guidelines

  • June 24, 2010 24 Jun'10

    Consumer apps, devices invading the enterprise

    Many employees are using social networking applications at work and bringing personal devices into the office despite corporate policies, according to a survey released Thursday by Cisco. Fifty-six ...

  • June 22, 2010 22 Jun'10

    Gartner: Companies shouldn't bother banning Facebook, social networking

    The research firm argues social networking isn't the responsibility of enterprise information security, but social media governance policies and monitoring practices are important.

  • June 21, 2010 21 Jun'10

    Customers pleased with Google Enterprise desktop security

    Google Enterprise desktop customers praise platform and tout security, privacy features. NATIONAL HARBOR, Md. -- Enterprise information security professionals, by nature, tend to be somewhat ...

  • June 10, 2010 10 Jun'10

    Adobe releases Flash Player security update

    As expected, Adobe Systems Inc. issued a security bulletin repairing 32 vulnerabilities in Flash Player. Adobe on Thursday released a security bulletin to patch 32 vulnerabilities in Flash Player, ...

  • April 21, 2010 21 Apr'10

    Faulty McAfee update hits Windows XP machines

    A flawed McAfee antivirus update caused Windows XP computers to lose network access and continuously reboot Wednesday. The faulty update caused widespread problems for organizations across the ...

  • April 02, 2010 02 Apr'10

    Face-off video: Thompson and Shostack on social networking, data privacy

    In case you missed it on the home page this week, please check out the first in our latest series of face-off videos, featuring security industry luminaries Hugh Thompson, ...

  • March 24, 2010 24 Mar'10

    FISMA overhaul under way

    Compliance with the Federal Information Security Management Act (FISMA) of 2002 has been just that--compliance. Critics rail against it, calling the reg a paperwork drill that has done little to ...

  • March 17, 2010 17 Mar'10

    Robert Maley dismissal, in retrospect, not surprising

    As first reported last week in the The Patriot-News of Pennsylvania and other outlets, Pennsylvania CISO Robert Maley was either fired or resigned under pressure following an appearance at RSA ...

  • March 01, 2010 01 Mar'10

    Secure cloud concept built on new Intel processor

    At a press event here on the opening day of the RSA Conference in San Francisco, EMC's security division, RSA, along with Intel and VMWare unveiled a proof of concept for creating secure and ...

  • February 09, 2010 09 Feb'10

    Spyware code targets BlackBerry users

    Proof-of-concept code released by a security researcher could be tweaked for use on almost any device. Demonstrates need for caution with mobile applications. A security researcher demonstrating ...

  • January 04, 2010 04 Jan'10

    Securosis adds Security Incite, Rothman to its roster

    Analyst and research firm Securosis announced today that it will merge with Security Incite, the popular blog and analysis site founded by Pragmatic CSO author Mike Rothman. Everything will remain ...

  • December 17, 2009 17 Dec'09

    Panda warns of American Express scam

    Standard phishing attack targets American Express customers. PandaLabs, the research arm of Panda Security, is warning users about a new phishing scam that attempts to trick people into giving up ...

  • December 04, 2009 04 Dec'09

    The world’s top 5 riskiest top-level domains

    McAfee’s 3rd Annual “Mapping the Mal Web” report highlights the top-level domains with the most road hazards. Like the auto industry, the Internet wasn’t designed with seatbelts and airbags. It ...

  • November 27, 2009 27 Nov'09

    Health Net breach failure of security policy, technology

    Investigators should question why an external hard drive contained seven years of data, but IT security should have had the appropriate security policies and technologies in place to enforce them.

  • November 25, 2009 25 Nov'09

    Schneier on the hidden cost of poor security

    Sales for certain specialized services depend highly on reputation and trust. Specialized services depend highly on trust and reputation says security guru Bruce Schneier who recently reposted a ...