Blog Posts Tagged with "2011"
February 02, 2012 Added by:Simon Heron
There is a great deal that can be gleaned from customer systems. When statistics from many different organizations, of different sizes, from different industries, in different countries are analyzed, they provide a useful insight into the true nature of security threats...
January 31, 2012 Added by:Headlines
The report attributes the increase to automation techniques being more widely used in the creation of malware variants - slightly altered signatures developed to foil anti-malware detection software. The report notes a sharp increase in the proliferation of Trojans...
March 21, 2011 Added by:Infosec Island Admin
The ISLAND TRADEWINDS program will highlight innovative new security products and services as well as those from established vendors at significantly discounted rates that will be offered exclusively to our registered members...
January 14, 2011 Added by:Brent Huston
While we were all focused on the economy last year, the entire information security threatscape suddenly changed, under the watchful eyes of our security teams. To me, the overall effectiveness, capability and tenacity of both Zeus and Stuxnet is an Oppenheimer moment in information security...
January 13, 2011 Added by:Robb Reck
Security does not exist in a vacuum. We are employed for the express purpose of helping our organization meet its objectives. If we accept that as true, shouldn't we also accept that in order to do our jobs properly we need to understand the company's objective?
January 05, 2011 Added by:Javvad Malik
Information security is not unlike most professional industries. Whenever anything goes wrong, it’s never really our fault. With a large number of people to point the finger at, it’s almost too easy to shift the blame. So, this year, I’d like to set off on a more positive and accountable route...
December 30, 2010 Added by:Headlines
The list includes the obvious and not so obvious steps every user of online and mobile devices should implement. Grier's recommendations are simple, quick to employ, and can be accomplished at little or no cost to consumers...
December 26, 2010 Added by:Rebecca Herold
The component that brings the most vulnerability to all forms of information is still the same as it has been for not only the past few years, but also the past few centuries: humans. But sadly, this component is woefully ignored and neglected when it comes to security and privacy in most organizations...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013