Information Security Policies Procedures and Guidelines

  • November 17, 2009 17 Nov'09

    Russian cybercriminals target H1N1 Swine flu fears

    Report outlines massive affiliate campaigns pushing pharmaceuticals, including counterfeit Tamiflu, making Russian hackers millions. Researchers at security vendor Sophos’ Canadian-based research ...

  • October 15, 2009 15 Oct'09

    Is it time for security managers to get tough?

    With so many of the same security problems plaguing organizations year after year, it's time to get tough, a health care security executive suggested Tuesday during a panel discussion at the ...

  • September 30, 2009 30 Sep'09

    Twitter gets condemned by CISOs at Forrester forum

    Security professionals are worried the social network could cause security problems for their companies. CISOs attending Forrester Research Inc.’s security forum held Sept. 10-11 in San Diego must ...

  • September 17, 2009 17 Sep'09

    Successful rogue antivirus hinges on social engineering

    Attackers are getting better at social engineering because Internet users are ignoring privacy. Attackers have gotten very good at tricking end users into clicking on links to malicious content and ...

  • September 16, 2009 16 Sep'09

    Zeus Trojan evades antivirus software, Trusteer says

    A study of 10,000 PCs infected with the Zeus showed that the machines had antivirus installed. The Zeus Trojan has already proven itself to be one nasty piece of malware in its quest for banking ...

  • September 14, 2009 14 Sep'09

    ShmooCon soliciting papers

    Organization announces an open call for papers and presentation proposals for the annual ShmooCon event. The Shmoo Group is soliciting papers and presentations for the sixth annual ShmooCon. The ...

  • September 08, 2009 08 Sep'09

    Security industry remains resilient to tough economy

    A new survey from Gartner Inc. is confirming what industry analysts and experts have said over the last year and a half: The Security industry is resilient to the tough economy. Gartner is ...

  • July 29, 2009 29 Jul'09

    Expert: Information security spending often restricts innovation

    In the opening keynote at the Black Hat USA 2009 conference, a former Google executive urged security pros to stop spending money on technologies that place restrictions on employees and instead empower end users to be security aware.

  • June 23, 2009 23 Jun'09

    Cybersecurity czar candidate questions clout of new position

    Former U.S. Congressman Tom Davis, a leading candidate for the White House cybersecurity czar, says the job has a number of major challenges to overcome.

  • June 19, 2009 19 Jun'09

    What is a browser? Video may change your security training strategy

    If a major piece of your security strategy revolves around employee training, the following video might be a major setback. Many security pros pride themselves on the amount of training they give ...

  • June 08, 2009 08 Jun'09

    V.i Labs integrates Google maps to track software piracy

    Google maps integration looks cool, but in this tough global economy are software vendors going to spend the money needed to pursue offenders? V.i. Laboratories, Inc., is adding Google maps to its ...

  • June 02, 2009 02 Jun'09

    WH cybersecurity plan needs private sector guidance

    The job of critical infrastructure protection must include guidance from the private sector to put best practices to work at the federal level.

  • May 29, 2009 29 May'09

    Obama announces creation of cybersecurity coordinator position

    The president promised to treat critical infrastructure as a strategic national asset, and that the cybersecurity coordinator would be responsible for orchestrating cybersecurity policy and response to cyberattacks.

  • May 01, 2009 01 May'09

    Panda goes light on client, heavy into cloud

    Feeling stuffed, sluggish? Oh, it’s not you? It’s your PC suffering from a bad case of AV bloat. How many thousands of antimalware definitions can it take? How many updates? (Remember when your AV ...

  • April 23, 2009 23 Apr'09

    Security bloggers, podcasters get day in sun

    These days, you can't log onto Twitter or do a Google search without crashing headfirst into something information security related. Security pros have embraced social networking in a big way, and ...