Information Security Policies Procedures and Guidelines
- June 24, 2010
Many employees are using social networking applications at work and bringing personal devices into the office despite corporate policies, according to a survey released Thursday by Cisco. Fifty-six ...
- June 22, 2010
The research firm argues social networking isn't the responsibility of enterprise information security, but social media governance policies and monitoring practices are important.
- June 21, 2010
Google Enterprise desktop customers praise platform and tout security, privacy features. NATIONAL HARBOR, Md. -- Enterprise information security professionals, by nature, tend to be somewhat ...
- June 10, 2010
As expected, Adobe Systems Inc. issued a security bulletin repairing 32 vulnerabilities in Flash Player. Adobe on Thursday released a security bulletin to patch 32 vulnerabilities in Flash Player, ...
- April 21, 2010
A flawed McAfee antivirus update caused Windows XP computers to lose network access and continuously reboot Wednesday. The faulty update caused widespread problems for organizations across the ...
- April 02, 2010
In case you missed it on the SearchSecurity.com home page this week, please check out the first in our latest series of face-off videos, featuring security industry luminaries Hugh Thompson, ...
- March 24, 2010
Compliance with the Federal Information Security Management Act (FISMA) of 2002 has been just that--compliance. Critics rail against it, calling the reg a paperwork drill that has done little to ...
- March 17, 2010
As first reported last week in the The Patriot-News of Pennsylvania and other outlets, Pennsylvania CISO Robert Maley was either fired or resigned under pressure following an appearance at RSA ...
- March 01, 2010
At a press event here on the opening day of the RSA Conference in San Francisco, EMC's security division, RSA, along with Intel and VMWare unveiled a proof of concept for creating secure and ...
- February 09, 2010
Proof-of-concept code released by a security researcher could be tweaked for use on almost any device. Demonstrates need for caution with mobile applications. A security researcher demonstrating ...
- January 04, 2010
Analyst and research firm Securosis announced today that it will merge with Security Incite, the popular blog and analysis site founded by Pragmatic CSO author Mike Rothman. Everything will remain ...
- December 17, 2009
Standard phishing attack targets American Express customers. PandaLabs, the research arm of Panda Security, is warning users about a new phishing scam that attempts to trick people into giving up ...
- December 04, 2009
McAfee’s 3rd Annual “Mapping the Mal Web” report highlights the top-level domains with the most road hazards. Like the auto industry, the Internet wasn’t designed with seatbelts and airbags. It ...
- November 27, 2009
Investigators should question why an external hard drive contained seven years of data, but IT security should have had the appropriate security policies and technologies in place to enforce them.
- November 25, 2009
Sales for certain specialized services depend highly on reputation and trust. Specialized services depend highly on trust and reputation says security guru Bruce Schneier who recently reposted a ...