Application Security — Features

Does Google know too much about you?

Do you trust Google? If you use its multitude of online services on a daily basis you might, but is that assumption wise? For some, Google is a wonderful company with a broad selection of useful online tools that make life easier, but for others Google is a looming, unregulated monster just waiting for the moment to drop the 'don't' from the company's unofficial motto, "Don't be evil."

Ian Paul | 11 Jul | Read more

How to stop fraud

Bernard Madoff, Allen Stanford and California money manager Danny Pang may be the latest examples of outrageous fraud. But what about the little guys? The administrator, middle manager or call-center rep?

Stacy Collett | 07 Jul | Read more

North Korea: Culprit in DDoS Attacks?

The timing and targets in a recent wave of distributed denial-of-service (DDoS) attacks has some security experts pointing the finger at North Korea. After all, the attacks coincided with the rogue state's firing of missiles during the July 4 Independence Day Weekend and the U.S. and South Korea were the countries in the cyber crosshairs.

Bill Brenner | 09 Jul | Read more

Top 10 reasons the firewall guy's hair is on fire

Firewalls are a mature technology, right? Most companies have at least one, if not several. And since an established knowledge base exists to tap for issues and PCI DSS 1.1 and 1.2 are pretty clear cut, firewall management shouldn't be much of an issue, right? No one is going to suffer the brunt of managing the significant infrastructure change these regulations are bound to bring more than the security operations team, correct?

Mark Desmond | 26 Jun | Read more

Merchants struggle to comply with PCI security in economy

The heads of seven business organizations sent PCI Security Standards Council General Manager Bob Russo a cry for help earlier this month, saying the recession is making it "increasingly difficult" for merchants to meet the requirements of the Payment Card Industry's Data Security Standard (PCI DSS).

Bill Brenner | 25 Jun | Read more

System security: how to improve your defenses against attack

Gaining attention for advocating a practical shift in how IT leaders think about security, the Consensus Audit Guidelines offer 20 controls to measure and monitor IT-system and network security. Though worries about increased cost often accompany any notion of improving security, John Gilligan, a consultant who developed the guidelines, says he implemented a subset of the controls when he was the Air Force CIO (from 2001 to 2005) and saved money on IT and risk management.

Kim S. Nash | 30 Jun | Read more

Pirate Party finds France fertile territory

Sweden's Pirate Party won 7.13 percent of the vote in elections earlier this month. Its campaign for the respect of privacy, the reform of copyright law and the abolition of the patent system earned it a seat in the European Parliament, and it may yet gain another seat there, if planned changes to the number of seats attributed to each country win approval.

Peter Sayer | 27 Jun | Read more

Seven Deadly Sins of home office security

According to the human resources association World at Work, 17.2 million Americans worked from home or remotely at least one day per month for their employer last year (See also: <a href="%20http://www.csoonline.com/article/486280/_Telecommuting_Security_Mistakes_">4 Telecommuting Security Mistakes</a>). And the 2007 book 'Microtrends' estimates that 4.2 million Americans work full-time from home.

Joan Goodchild | 23 Jun | Read more