Risk assessments metrics and frameworks
- May 15, 2007
A new appliance from HP touts event data management software from San Francisco-based SenSage Inc. to centrally store logging data for audits and investigations.
- May 10, 2007
Employees may think it's no big deal to do some blogging on a company laptop from home or the airport. But one security expert says the practice poses some serious risks.
- May 04, 2007
This week in Security Blog Log: Gartner says hacking contests have nothing but negative results, but some security bloggers disagree.
- April 25, 2007
IT operations is turning to software that monitors security configurations across the enterprise to meet a number of regulations.
- March 27, 2007
Brief: Metasploit Framework 3.0 contains 177 exploits, 104 payloads, 17 encoders and 30 auxiliary modules that perform such tasks as host discovery and protocol fuzzing.
- March 21, 2007
Steven Adler, program director of Data Governance Solutions for IBM and chairman of the Data Governance Council, has been working to understand the growing need for data security, the issues surrounding data compliance and data protection problems. ...
- March 18, 2007
Those who know where to look could use Google to dig up all sorts of sensitive company information, including intellectual property and passwords, one security expert warns.
- March 08, 2007
Symantec has acquired Reston, Va.-based 4FrontSecurity, a maker of automated risk analysis and security management tools. An expert says it's the latest sign that the security risk assessment market is heating up.
- February 26, 2007
PatchLink Corp. says it will add more muscle to its vulnerability management portfolio by acquiring the STAT Guardian tool from IT vendor Harris Corp.
- February 06, 2007
RSA Conference 2007: Product announcements
- February 06, 2007
In his exclusive daily column from RSA Conference 2007, security pro Chris Wysopal comments on vulnerability disclosure, and says emerging Web application technologies present many new attack vectors that have yet to be discovered.
- January 24, 2007
New startup Veracode gives customers the ability to analyze the application binary, and not simply the source code.
- December 14, 2006
Hot Pick: Skybox View 3.0 offers a unique and flexible approach for assessing and managing specific threats and overall risk to your digital assets.
- December 05, 2006
IBM plans to acquire Consul Risk Management Inc., a Delft, Netherlands-based firm whose software tracks non-compliant behavior of employees.
- November 21, 2006
Insiders could be the greatest threat to a company's security. The best defense is to let them know Big Brother is watching and a plan to deal with troublemakers.