Information Security Policies Procedures and Guidelines
- July 16, 2013
I'm fairly sure that the folks at Uniqul are serious--they've recently announced a product that uses facial recognition to extract your payments when you buy things. You scan your purchases, it ...
- March 27, 2013
Panelists at the SANS Cyber Threat Intelligence Summit lament the challenges of using cyber-intelligence to thwart enterprise security threats.
- July 26, 2012
It seems the Federal Financial Institutions Examination Council could have done a little better with its cloud computing advisory. Earlier this month, the FFIEC issued a statement on outsourced ...
- July 18, 2012
A recent audit into U.S. federal agencies' adoption of cloud computing services highlighted challenges that likely would resonate with private enterprises looking to move applications to the cloud. ...
- July 11, 2012
AWS outage won't deter Netflix from the cloud. Netflix says it remains bullish on the cloud despite AWS outage.
- June 21, 2012
As the opening day of the 2012 Olympic Games nears, IT teams in the U.K. are busy expanding their companies’ security policies and reviewing their security contingency plans. They are preparing for ...
- June 14, 2012
Security awareness training often teaches the importance of password length and password complexity, but these best practices, as it turns out, may be creating a false sense of security. Even ...
- June 08, 2012
Wednesday's Cornerstones of Trust Conference featured an interesting CSO discussion of some of the hottest topics infosecurity pros are dealing with today, including the BYOD trend, cloud computing ...
- June 01, 2012
Security experts have warned about the potential problems caused by military cyberstrikes. Experts say cyberwarfare is difficult to plan and worse, it puts innocent people at risk. Stuxnet was part ...
- May 31, 2012
After working hard to create sound security policies, it's easy for enterprise information security managers to be dismayed when users ignore the rules and knowingly bypass security controls. When ...
- May 30, 2012
A bane for U.S.-based cloud providers for several months now has been the assumption among cloud customers and service providers outside the U.S. - especially in Europe - that the Patriot Act gives ...
- May 16, 2012
Information security spending is thought to be recession proof, but does it have the legs to outrun the current downturn? In-Q-Tel partner Peter Kuper thinks so, but there are still some rough ...
- May 16, 2012
At an event last week in San Francisco that covered a variety of cloud security issues, infosec expert Kevin Walker told attendees to be aggressive with cloud service providers and hold them ...
- May 09, 2012
Symantec recently released some interesting findings from a survey the company conducted with the Cloud Security Alliance at the CSA Summit in February. The survey went beyond the usual sorts of ...
- May 02, 2012
As security pros wait for more details about the VMware ESX hypervisor source code leak, should they be panicking? Well no, not yet, anyway. Without knowing exactly what source code was leaked, ...