IT managers should focus on explaining business risk, customer impact, regulatory requirements and due diligence when justifying the need for IT security investments to corporate executives.
Jaikumar Vijayan |
14 Sep |
Read more
Last week's enhancements to the Payment Card Industry Data Security Standard and the creation of a new company for managing the standard should help alleviate some core issues related to its adoption, analysts said.
Jaikumar Vijayan |
14 Sep |
Read more
Focus and simplicity are key to developing and implementing companywide information security policies, according to IT managers at a panel discussion at the Infosec World conference in Orlando this week.
Jaikumar Vijayan |
05 Apr |
Read more
Zero-day exploits such as those targeting an unpatched vulnerability in Microsofts Internet Explorer Web browser are exposing some of the limitations of the company's monthly patch release schedule, users and analysts said Tuesday.
Jaikumar Vijayan |
30 Mar |
Read more
The assumption that network port scans are a precursor to attempted hacks into computers may be flawed, according to research from the University of Maryland's A. James Clark School of Engineering.
Jaikumar Vijayan |
13 Dec |
Read more
The big increase in online sales expected this holiday shopping season comes amid what appears to be unprecedented consumer concerns over data privacy, online fraud and identity theft.
Jaikumar Vijayan |
30 Nov |
Read more
Companies that make regulatory compliance the sole driver of their information security efforts could be weakening their long-term security posture instead of improving it, according to IT managers at the 32nd annual US Computer Security Institute conference held last week. Therefore, it's better to make compliance a by-product of a broader corporate security strategy -- not its sole end objective, they said.
Jaikumar Vijayan |
21 Nov |
Read more
Regulatory compliance requirements and concerns over data compromises have elevated the importance of information security issues in corporate boardrooms, according to panelists at the 32nd annual conference organized by the Computer Security Institute. And that trend is lending urgency to the need for security managers to adopt a more business-oriented approach to their jobs.
Jaikumar Vijayan |
15 Nov |
Read more
IT managers looking to protect sensitive data from being compromised by external hackers and malicious insiders are getting more tools for their security arsenal.
Jaikumar Vijayan |
08 Nov |
Read more
The growing popularity of Skype Technologies' free Internet telephony software could soon pose the same kind of security challenges for companies that other peer-to-peer (P2P) software technologies have created in recent years, according to security experts.
Jaikumar Vijayan |
28 Oct |
Read more
An internal Novell investigation of an apparent hack involving one of its computers revealed that the incident was less serious than was described by the security consultant who reported it to the company, a spokesman said Friday.
Jaikumar Vijayan |
04 Oct |
Read more
A company server that some workers at Novell apparently used for gaming purposes was hacked into and then used to scan for vulnerable ports on potentially millions of computers worldwide, according to an Internet security consultant.
Jaikumar Vijayan |
29 Sep |
Read more
The expanding investigation into this month's Zotob worm outbreak is uncovering evidence of the growing nexus between worm writers and gangs looking to profit from cybercrime, according to security experts.
Jaikumar Vijayan |
01 Sep |
Read more
The speed at which hackers were able to take advantage of newly disclosed software flaws makes its vital for companies to look beyond patching to broader and more holistic measures for controlling vulnerabilities, security experts said.
Jaikumar Vijayan |
19 Aug |
Read more
Officials at Sunbelt Software, a US-based vendor of antispyware tools, said the company stumbled upon a massive ID theft ring that is using a well-known spyware program to break into and systematically steal confidential information from an unknown number of computers worldwide.
Jaikumar Vijayan |
08 Aug |
Read more