Information Security Policies Procedures and Guidelines

  • June 09, 2011 09 Jun'11

    Adobe to issue important security updates

    Adobe announced Thursday that it plans to release updates for its Reader and Acrobat products. The fixes, which Adobe categorizes as critical, affect Adobe Reader X  (10.0.1) for Windows and Adobe ...

  • June 02, 2011 02 Jun'11

    Tips for selling security

    Selling security to business executives is never easy, especially in a slow economy. One infosec manager discussed the difficulties and offered some tips for success in a presentation at the ...

  • May 25, 2011 25 May'11

    Eye On: Virtualization Security's "Eye On" series examines a security topic each month. In May, the series explores virtualization security and the technologies and methodologies available to reduce vulnerabilities and improve virtualization processes.

  • May 18, 2011 18 May'11

    ICASI publishes new vulnerability reporting framework

    A new Common Vulnerability Framework sets a standard so organizations can share vulnerability information in a common readable format.

  • May 17, 2011 17 May'11

    Facebook scam prompts call for more social networking safeguards

    Scammers are spreading phishing attacks and other scams on Facebook and other social networks. Facebook scammers began spreading a cross-site scripting attack last weekend, luring victims with a ...

  • May 03, 2011 03 May'11

    Sony attack: Sony expands scope of its massive data security breach

    Sony executives said an attack on its PlayStation Network systems, also exposed the data of 24.6 million users at its Online Entertainment division.

  • April 21, 2011 21 Apr'11

    Eye On: Secure Software Development

    This special report explores software security: reducing vulnerabilities and improving development processes.

  • April 19, 2011 19 Apr'11

    Microsoft releases first third-party security advisories

    Microsoft on Tuesday released its first security advisories for vulnerabilities its researchers found in third-party products: two in Google's Chrome browser and one in Opera. Both have been fixed ...

  • April 07, 2011 07 Apr'11 Blogs

  • February 16, 2011 16 Feb'11

    HP's risk equation combines security, IT ops

    SAN FRANCISCO -- When HP announced last September its intent to acquire SIM leaders ArcSight, it was a pretty startling $1.5B deal. Not only had another security company fallen off the map into the ...

  • January 31, 2011 31 Jan'11

    High school cybersecurity competition kicks off

    The Center for Internet Security's US Cyber Challenge today kicked off an online competition to identify high school students possibly interested in cybersecurity career. The Cyber Foundations ...

  • January 27, 2011 27 Jan'11

    Ignoring mobile hype? Don't overlook growing mobile device threats

    It may seem like more mobile hype, but Senior Site Editor Eric B. Parizo writes that there are legitimate reasons why mobile device threats may be on the rise.

  • January 13, 2011 13 Jan'11

    St. Bernard changes name to EdgeWave

    Rebranding part of strategy to streamline operations and expand technology portfolio. Web security appliance vendor St. Bernard Software Inc. is renaming itself. The software vendor, which targets ...

  • January 05, 2011 05 Jan'11

    Rogue antivirus skyrockets, Trojans continue to dominate, PandaLabs finds

    Panda Security researchers document the troubling use of fake antivirus software Rogue antivirus first surfaced only four years ago, but today it makes up about 11.6% of all malware, according to ...

  • December 16, 2010 16 Dec'10

    Information security 2011: Next-gen threats demand layered defense

    Infosec pros got an up-close-and-personal look at advanced attacks in 2010, and Senior Site Editor Eric B. Parizo says without learning from them, many enterprises will fall victim in 2011 as well.