Information Security Policies Procedures and Guidelines

  • April 19, 2011 19 Apr'11

    Microsoft releases first third-party security advisories

    Microsoft on Tuesday released its first security advisories for vulnerabilities its researchers found in third-party products: two in Google's Chrome browser and one in Opera. Both have been fixed ...

  • April 07, 2011 07 Apr'11 Blogs

  • February 16, 2011 16 Feb'11

    HP's risk equation combines security, IT ops

    SAN FRANCISCO -- When HP announced last September its intent to acquire SIM leaders ArcSight, it was a pretty startling $1.5B deal. Not only had another security company fallen off the map into the ...

  • January 31, 2011 31 Jan'11

    High school cybersecurity competition kicks off

    The Center for Internet Security's US Cyber Challenge today kicked off an online competition to identify high school students possibly interested in cybersecurity career. The Cyber Foundations ...

  • January 27, 2011 27 Jan'11

    Ignoring mobile hype? Don't overlook growing mobile device threats

    It may seem like more mobile hype, but Senior Site Editor Eric B. Parizo writes that there are legitimate reasons why mobile device threats may be on the rise.

  • January 13, 2011 13 Jan'11

    St. Bernard changes name to EdgeWave

    Rebranding part of strategy to streamline operations and expand technology portfolio. Web security appliance vendor St. Bernard Software Inc. is renaming itself. The software vendor, which targets ...

  • January 05, 2011 05 Jan'11

    Rogue antivirus skyrockets, Trojans continue to dominate, PandaLabs finds

    Panda Security researchers document the troubling use of fake antivirus software Rogue antivirus first surfaced only four years ago, but today it makes up about 11.6% of all malware, according to ...

  • December 16, 2010 16 Dec'10

    Information security 2011: Next-gen threats demand layered defense

    Infosec pros got an up-close-and-personal look at advanced attacks in 2010, and Senior Site Editor Eric B. Parizo says without learning from them, many enterprises will fall victim in 2011 as well.

  • November 09, 2010 09 Nov'10

    Study shows lack of corporate security training

    A recent study by Clearswift indicates that companies aren't doing enough to train their workers about Internet security. The Web and email security company conducted a survey of some 2,000 office ...

  • October 27, 2010 27 Oct'10

    Privacy advocate explains why people should care about privacy

    An all out assault on privacy is taking place and some people are failing to see the problem. Toronto – Many of the people who claim the death of privacy are profiting from it, according to a ...

  • October 26, 2010 26 Oct'10

    Juniper launches mobile security suite

    Juniper Networks on Tuesday unveiled a software suite that company executives touted as the first product to provide integrated security and secure connectivity across all types of mobile devices. ...

  • October 21, 2010 21 Oct'10

    IBM announces new cloud security services

    IBM is selling professional services, hosted security event and log management technology and a hosted vulnerability management service. IBM announced this week new professional and technology ...

  • September 17, 2010 17 Sep'10

    Forrester: The simple, two-year plan for security program maturity

    Forrester analyst Khalid Kark said a good information security program starts with a risk assessment.

  • July 28, 2010 28 Jul'10

    Rite Aid to pay $1 million in HIPAA settlement

    Rite Aid, the third largest pharmacy chain in the country, agreed to settle government charges that it failed to protect sensitive medical and financial information belonging to its customers and ...

  • July 15, 2010 15 Jul'10

    Poisoned Mel Gibson search results yield fake Adobe Flash installer

    A search for “Mel Gibson tapes” yields plenty of poisoned webpages, according to TrendLabs researchers. People searching for information related to the Mel Gibson controversy will get a startling ...