Information Security Policies Procedures and Guidelines
- October 18, 2011
Move is part of an industry trend that turns threat intelligence data into actionable information. Symantec is bolstering its DeepSight service and integrating its VeriSign acquisition. The company ...
- October 05, 2011
CAMBRIDGE, MA. -- On the same day consolidation hit the security information and event management market hard, a group of influential industry leaders was busy talking innovation and telling the ...
- September 20, 2011
Companies without a mobile device security policy risk not only losing data, but also running afoul of the law.
- September 07, 2011
While Oregon officials have had success with a cross-government compliance program, standardizing federal requirements is another matter.
- August 16, 2011
Oregon's model for compliance with IRS information security requirements could be used for cross-agency security at the federal level.
- August 11, 2011
At last week’s Black Hat 2011 conference, the Central Intelligence Agency’s former director of operations, Cofer Black, made the claim that the security community has a unique opportunity to ...
- June 21, 2011
New service aims to help businesses measure their security programs against Verizon’s Data Breach Investigations Report and the VERIS classification and reporting data.
- June 09, 2011
Adobe announced Thursday that it plans to release updates for its Reader and Acrobat products. The fixes, which Adobe categorizes as critical, affect Adobe Reader X (10.0.1) for Windows and Adobe ...
- June 02, 2011
Selling security to business executives is never easy, especially in a slow economy. One infosec manager discussed the difficulties and offered some tips for success in a presentation at the ...
- May 25, 2011
SearchSecurity.com's "Eye On" series examines a security topic each month. In May, the series explores virtualization security and the technologies and methodologies available to reduce vulnerabilities and improve virtualization processes.
- May 18, 2011
A new Common Vulnerability Framework sets a standard so organizations can share vulnerability information in a common readable format.
- May 17, 2011
Scammers are spreading phishing attacks and other scams on Facebook and other social networks. Facebook scammers began spreading a cross-site scripting attack last weekend, luring victims with a ...
- May 03, 2011
Sony executives said an attack on its PlayStation Network systems, also exposed the data of 24.6 million users at its Online Entertainment division.
- April 21, 2011
This special report explores software security: reducing vulnerabilities and improving development processes.
- April 19, 2011
Microsoft on Tuesday released its first security advisories for vulnerabilities its researchers found in third-party products: two in Google's Chrome browser and one in Opera. Both have been fixed ...