Information Security Policies Procedures and Guidelines
- April 19, 2011
Microsoft on Tuesday released its first security advisories for vulnerabilities its researchers found in third-party products: two in Google's Chrome browser and one in Opera. Both have been fixed ...
- April 07, 2011 07 Apr'11
- February 16, 2011
SAN FRANCISCO -- When HP announced last September its intent to acquire SIM leaders ArcSight, it was a pretty startling $1.5B deal. Not only had another security company fallen off the map into the ...
- January 31, 2011
The Center for Internet Security's US Cyber Challenge today kicked off an online competition to identify high school students possibly interested in cybersecurity career. The Cyber Foundations ...
- January 27, 2011
It may seem like more mobile hype, but Senior Site Editor Eric B. Parizo writes that there are legitimate reasons why mobile device threats may be on the rise.
- January 13, 2011
Rebranding part of strategy to streamline operations and expand technology portfolio. Web security appliance vendor St. Bernard Software Inc. is renaming itself. The software vendor, which targets ...
- January 05, 2011
Panda Security researchers document the troubling use of fake antivirus software Rogue antivirus first surfaced only four years ago, but today it makes up about 11.6% of all malware, according to ...
- December 16, 2010
Infosec pros got an up-close-and-personal look at advanced attacks in 2010, and Senior Site Editor Eric B. Parizo says without learning from them, many enterprises will fall victim in 2011 as well.
- November 09, 2010
A recent study by Clearswift indicates that companies aren't doing enough to train their workers about Internet security. The Web and email security company conducted a survey of some 2,000 office ...
- October 27, 2010
An all out assault on privacy is taking place and some people are failing to see the problem. Toronto – Many of the people who claim the death of privacy are profiting from it, according to a ...
- October 26, 2010
Juniper Networks on Tuesday unveiled a software suite that company executives touted as the first product to provide integrated security and secure connectivity across all types of mobile devices. ...
- October 21, 2010
IBM is selling professional services, hosted security event and log management technology and a hosted vulnerability management service. IBM announced this week new professional and technology ...
- September 17, 2010
Forrester analyst Khalid Kark said a good information security program starts with a risk assessment.
- July 28, 2010
Rite Aid, the third largest pharmacy chain in the country, agreed to settle government charges that it failed to protect sensitive medical and financial information belonging to its customers and ...
- July 15, 2010
A search for “Mel Gibson tapes” yields plenty of poisoned webpages, according to TrendLabs researchers. People searching for information related to the Mel Gibson controversy will get a startling ...