Information Security Policies Procedures and Guidelines

  • May 30, 2007 30 May'07

    What does Google want in the security industry?

    As you most likely know by this point, Google has recently built an in-house anti-malware team and brought the team out into the light of day via a new blog. When I read Ryan Naraine's post about ...

  • May 30, 2007 30 May'07

    Mobility forces Sun to open Windows

    Had an interesting conversation with new Sun Microsystems CISO Leslie Lambert this week. Lambert is a Sun veteran having held a litany of IT roles including several line-of-business CIO titles. ...

  • May 30, 2007 30 May'07

    Report: China preparing for cyberwar

    If the Defense Department's recent report to Congress on China's military might is to be believed, the communist nation is going all-out to prepare for future warfare in cyberspace. According to ...

  • May 25, 2007 25 May'07

    Google launches its own security blog

    For the last year and a half, I’ve been writing a weekly column called Security Blog Log, about what IT security pros are discussing in the blogosphere. Starting this week, the column will be ...

  • May 24, 2007 24 May'07

    nCircle scoops up Cambia

    There's yet another acquisition in the security market to talk about today. Risk and compliance management vendor nCircle announced it has completed the acquisition of Cambia Security, a company ...

  • May 23, 2007 23 May'07

    New Vista deployment series

    We launched a new series on this week focusing on IT shops that are at various stages of dealing with Windows Vista. This series will run throughout 2007 and will focus on the ...

  • May 23, 2007 23 May'07

    House approves antispyware bill

    Organizations struggling to keep spyware off its computer systems have long clamored for some tough legislative action to punish those who push the insidious programs. But to date, Congress has had ...

  • May 23, 2007 23 May'07

    Bad, bad bunny

    OpenOffice users should take precautions against a macro worm that's making the rounds, attempting to download and display a JPEG image of a man wearing a bunny suit performing a sexual act in the ...

  • May 22, 2007 22 May'07

    Special numbers not so special anymore

    In the world of cryptography, advances are few and far between relative to the rest of the security and technology industries. But one of those rare forward leaps came Monday when a team comprising ...

  • May 21, 2007 21 May'07

    Visa pushes application security

    Visa USA is making progress on its effort to improve payment application security. As of last month, 155 products across 80 vendors have been validated by qualified assessors as meeting Visa's ...

  • May 21, 2007 21 May'07

    Symantec update cripples Chinese PCs

    Millions of Chinese computers crashed over the weekend, thanks to a flawed Symantec Norton AntiVirus signature update. China's state-sponsored Xinhau News Agency reported that more than 1,000 ...

  • May 18, 2007 18 May'07

    A snapshot of the Chinese hacking scene

    Symantec has put out a new report that takes an interesting look at the Chinese hacking scene. In recent years, Symantec noted in an emailed summary of the report, China has become a focal point in ...

  • May 18, 2007 18 May'07

    A sad experiment

    Security professional Didier Stevens figured it would be a hoot running an experiment to see how many people would willingly click on a URL promising to infect their PC. So he ran this ad on ...

  • May 17, 2007 17 May'07

    Lawyer Time

    IT folks better be ready to spend a lot of time with lawyers if their company is sued, an attorney told IT executives Wednesday in Palo Alto. The Federal Rules of Civil Procedure were amended in ...

  • May 17, 2007 17 May'07

    Podcast: Penetration testing

    In this week's Security Wire Weekly podcast,'s Bill Brenner had a great interview with Core Security's Ivan Arce about the pros and cons of penetration testing. Arce also talks ...