Information Security Policies Procedures and Guidelines
- May 25, 2011
SearchSecurity.com's "Eye On" series examines a security topic each month. In May, the series explores virtualization security and the technologies and methodologies available to reduce vulnerabilities and improve virtualization processes.
- May 18, 2011
A new Common Vulnerability Framework sets a standard so organizations can share vulnerability information in a common readable format.
- May 17, 2011
Scammers are spreading phishing attacks and other scams on Facebook and other social networks. Facebook scammers began spreading a cross-site scripting attack last weekend, luring victims with a ...
- May 03, 2011
Sony executives said an attack on its PlayStation Network systems, also exposed the data of 24.6 million users at its Online Entertainment division.
- April 21, 2011
This special report explores software security: reducing vulnerabilities and improving development processes.
- April 19, 2011
Microsoft on Tuesday released its first security advisories for vulnerabilities its researchers found in third-party products: two in Google's Chrome browser and one in Opera. Both have been fixed ...
- April 07, 2011 07 Apr'11
- February 16, 2011
SAN FRANCISCO -- When HP announced last September its intent to acquire SIM leaders ArcSight, it was a pretty startling $1.5B deal. Not only had another security company fallen off the map into the ...
- January 31, 2011
The Center for Internet Security's US Cyber Challenge today kicked off an online competition to identify high school students possibly interested in cybersecurity career. The Cyber Foundations ...
- January 27, 2011
It may seem like more mobile hype, but Senior Site Editor Eric B. Parizo writes that there are legitimate reasons why mobile device threats may be on the rise.
- January 13, 2011
Rebranding part of strategy to streamline operations and expand technology portfolio. Web security appliance vendor St. Bernard Software Inc. is renaming itself. The software vendor, which targets ...
- January 05, 2011
Panda Security researchers document the troubling use of fake antivirus software Rogue antivirus first surfaced only four years ago, but today it makes up about 11.6% of all malware, according to ...
- December 16, 2010
Infosec pros got an up-close-and-personal look at advanced attacks in 2010, and Senior Site Editor Eric B. Parizo says without learning from them, many enterprises will fall victim in 2011 as well.
- November 09, 2010
A recent study by Clearswift indicates that companies aren't doing enough to train their workers about Internet security. The Web and email security company conducted a survey of some 2,000 office ...
- October 27, 2010
An all out assault on privacy is taking place and some people are failing to see the problem. Toronto – Many of the people who claim the death of privacy are profiting from it, according to a ...