Blog Posts Tagged with "2011"

A88973e7d0943d295c99820ab9aeed27

Looking Back: A Review of Threats Faced in 2011

February 02, 2012 Added by:Simon Heron

There is a great deal that can be gleaned from customer systems. When statistics from many different organizations, of different sizes, from different industries, in different countries are analyzed, they provide a useful insight into the true nature of security threats...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Report: Malware Creation Hit Record High in 2011

January 31, 2012 Added by:Headlines

The report attributes the increase to automation techniques being more widely used in the creation of malware variants - slightly altered signatures developed to foil anti-malware detection software. The report notes a sharp increase in the proliferation of Trojans...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Infosec Island March 2011 Newsletter

March 21, 2011 Added by:Infosec Island Admin

The ISLAND TRADEWINDS program will highlight innovative new security products and services as well as those from established vendors at significantly discounted rates that will be offered exclusively to our registered members...

Comments  (2)

E313765e3bec84b2852c1c758f7244b6

Welcome to the Post Zeus-Stuxnet World

January 14, 2011 Added by:Brent Huston

While we were all focused on the economy last year, the entire information security threatscape suddenly changed, under the watchful eyes of our security teams. To me, the overall effectiveness, capability and tenacity of both Zeus and Stuxnet is an Oppenheimer moment in information security...

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

Information Security Resolutions for 2011

January 13, 2011 Added by:Robb Reck

Security does not exist in a vacuum. We are employed for the express purpose of helping our organization meet its objectives. If we accept that as true, shouldn't we also accept that in order to do our jobs properly we need to understand the company's objective?

Comments  (2)

99edc1997453f90eb5ac1430fd9a7c61

Information Security: A New Year Resolution

January 05, 2011 Added by:Javvad Malik

Information security is not unlike most professional industries. Whenever anything goes wrong, it’s never really our fault. With a large number of people to point the finger at, it’s almost too easy to shift the blame. So, this year, I’d like to set off on a more positive and accountable route...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Eight Essential Tips for a Secure 2011

December 30, 2010 Added by:Headlines

The list includes the obvious and not so obvious steps every user of online and mobile devices should implement. Grier's recommendations are simple, quick to employ, and can be accomplished at little or no cost to consumers...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Infosec, Privacy and Compliance Soothsaying

December 26, 2010 Added by:Rebecca Herold

The component that brings the most vulnerability to all forms of information is still the same as it has been for not only the past few years, but also the past few centuries: humans. But sadly, this component is woefully ignored and neglected when it comes to security and privacy in most organizations...

Comments  (0)