December 04, 2013 Added by:Rohit Sethi
My colleague, Andre Harricharran, security consultant with Security Compass, offers a closer look at the mobile application assessment process and requirements, and what organizations should consider when procuring this type of service
December 03, 2013 Added by:Tripwire Inc
This article is mostly inspired by Jeff Garzik’s post, “‘Solution’ to bitcoin volatility,” in which Jeff, a Bitcoin core developer, discusses the price volatility which many feel is holding back Bitcoin from being a usable currency.
December 02, 2013 Added by:Rohit Sethi
Ponemon Institute and Security Innovation recently made public the results of a research study they did to get an idea of the state of application security across organizations.
December 01, 2013 Added by:Patrick Oliver Graf
A recent study has come to light which shows that although remote support tools are being increasingly implemented within enterprises, IT decision-makers are uncertain about their safety. They should be, and for good reason.
November 26, 2013 Added by:Danny Banks
Innovative enterprise security teams realize the importance of security event data and are changing the way they collect and store information for greater insight into the threat landscape.
November 26, 2013 Added by:Eric Cissorsky
If you're an SMB owner/partner, IT manager or part of the IT staff take some time to think about how your organizations security practices meet these needs. Do they? If not, at what level is there a problem? I
November 21, 2013 Added by:Patrick Oliver Graf
Enterprises must take extra precautions to safeguard their corporate networks as the end of the year approaches. With a smarter strategy for network security, the holidays can be a more peaceful and joyous time of year for enterprises.
November 20, 2013 Added by:InfosecIsland News
Join Symantec on Wednesday, November 20th at 9 am PST to learn the new research into employee behavior and attitudes toward IP theft that may surprise you. You will also learn some practical steps that you can start implementing that will help put a stop to the flow of IP to your competitors.
November 19, 2013 Added by:Rohit Sethi
An information security training program is crucial for ensuring and maintaining a good security posture; in order to effectively manage this program you have to be able to measure it. This article introduces a concept recommended by NIST in their Special Publication 800-16, for evaluating training effectiveness.
November 18, 2013 Added by:Vince Schiavone
To achieve advance warning of risks and threats, corporations now require social intelligence as the backbone of their crisis management strategy. This is no different than the way military or intelligence organizations operate – knowledge is power and propagates effective response.