Information Security Policies Procedures and Guidelines
- November 17, 2009
Report outlines massive affiliate campaigns pushing pharmaceuticals, including counterfeit Tamiflu, making Russian hackers millions. Researchers at security vendor Sophos’ Canadian-based research ...
- October 15, 2009
With so many of the same security problems plaguing organizations year after year, it's time to get tough, a health care security executive suggested Tuesday during a panel discussion at the ...
- September 30, 2009
Security professionals are worried the social network could cause security problems for their companies. CISOs attending Forrester Research Inc.’s security forum held Sept. 10-11 in San Diego must ...
- September 17, 2009
Attackers are getting better at social engineering because Internet users are ignoring privacy. Attackers have gotten very good at tricking end users into clicking on links to malicious content and ...
- September 16, 2009
A study of 10,000 PCs infected with the Zeus showed that the machines had antivirus installed. The Zeus Trojan has already proven itself to be one nasty piece of malware in its quest for banking ...
- September 14, 2009
Organization announces an open call for papers and presentation proposals for the annual ShmooCon event. The Shmoo Group is soliciting papers and presentations for the sixth annual ShmooCon. The ...
- September 08, 2009
A new survey from Gartner Inc. is confirming what industry analysts and experts have said over the last year and a half: The Security industry is resilient to the tough economy. Gartner is ...
- July 29, 2009
In the opening keynote at the Black Hat USA 2009 conference, a former Google executive urged security pros to stop spending money on technologies that place restrictions on employees and instead empower end users to be security aware.
- June 23, 2009
Former U.S. Congressman Tom Davis, a leading candidate for the White House cybersecurity czar, says the job has a number of major challenges to overcome.
- June 19, 2009
If a major piece of your security strategy revolves around employee training, the following video might be a major setback. Many security pros pride themselves on the amount of training they give ...
- June 08, 2009
Google maps integration looks cool, but in this tough global economy are software vendors going to spend the money needed to pursue offenders? V.i. Laboratories, Inc., is adding Google maps to its ...
- June 02, 2009
The job of critical infrastructure protection must include guidance from the private sector to put best practices to work at the federal level.
- May 29, 2009
The president promised to treat critical infrastructure as a strategic national asset, and that the cybersecurity coordinator would be responsible for orchestrating cybersecurity policy and response to cyberattacks.
- May 01, 2009
Feeling stuffed, sluggish? Oh, it’s not you? It’s your PC suffering from a bad case of AV bloat. How many thousands of antimalware definitions can it take? How many updates? (Remember when your AV ...
- April 23, 2009
These days, you can't log onto Twitter or do a Google search without crashing headfirst into something information security related. Security pros have embraced social networking in a big way, and ...