www.fgks.org »
Address
:
[go:
up one dir
,
main page
]
Include Form
Remove Scripts
Accept Cookies
Show Images
Show Referer
Rotate13
Base64
Strip Meta
Strip Title
Session Cookies
Mobile Version
Subscribe
Contact Us
About Us
Advertising
Editorial
SC UK
SC Aus/NZ
Home
News
Features
Opinions
Congress News & Opinions
Products
Sectors
News Bytes
Canada News
Newsletters
Products
Group Tests
First Looks
Products
About Reviews
Blogs
The News Team Blog
The Data Breach Blog
The SC Magazine Awards Blog
Buyers Guide
Whitepapers
Jobs
Events
SC World Congress NYC
SC Congress Canada
SCWC 24/7
Editorial Webcasts
Vendor Webcasts
Podcasts
SC Awards U.S.
SC Awards Canada
Subscribe
Newsletters
Subscribe to SC
Archive
SC World Congress
Archive
Topic Center:
Financial Services
Health Care
Retail
Government
SC Awards
SC Canada
SC Scholars
Cybercrime Corner
RSS
|
Login
|
Register
IT Security Training
Best practices for security awareness training
Angela Moscaritolo
November 11, 2010
Security awareness training programs should be an essential part of information security endeavors, a security professional said Thursday at SC World Congress in New York.
Strained budgets cause severe security cutbacks
Angela Moscaritolo
July 27, 2009
Due to strained budgets, some IT departments are cutting funding for technologies that would help mitigate threats they are most concerned about, according to a survey from RSA Conference, released Wednesday.
Black Hat topics include hacking parking meters, social networks
Angela Moscaritolo
June 19, 2009
Researchers are set to discuss a wide range of topics at the annual Black Hat conference.
Security expert wants feds to recruit volunteer pen testers
Dan Kaplan
June 18, 2009
One respected security researcher wants to legalize the hacking of federal government and military websites -- and he wants everyone to hear him out.
List of U.S. nuclear facilities inadvertently posted on website
Chuck Miller
June 03, 2009
In an inadvertent security breach, a document that detailed information on nuclear sites was posted on the Government Printing Office's website.
GAO report finds security lagging at federal agencies
Dan Kaplan
May 21, 2009
Federal agencies continue to be lax in their implementation of information security programs, according to a new report from the Government Accountability Office.
RSA: Ramifications of converging physical and IT security
Angela Moscaritolo
April 23, 2009
Companies should consider merging physical and information security into a converged program -- it might be challenging but it will be worth it.
RSA: Cybercriminals keeping up with banking safeguards
Dan Kaplan
April 22, 2009
Customer education and a holistic security strategy are the best approaches to fight fraud within the financial services community, a panel of experts said Wednesday at the RSA Conference in San Francisco.
Children's online safety initiative announced
Angela Moscaritolo
April 20, 2009
A new program is encouraging information security experts to educate school children about how to protect themselves online.
Despite downturn, IT security spending to increase
Angela Moscaritolo
April 13, 2009
Management increasingly is recognizing security as a top business priority, which is resulting in higher budgets for some organizations despite the economic slowdown, according to a new survey.
Survey finds that SMBs often lack basic security
Angela Moscaritolo
April 10, 2009
Despite being aware of the importance of security, small-to-medium-size businesses (SMBs) generally are not protecting their networks, according to a survey released Thursday by Symantec.
OWASP Security Spending Benchmarks Report published
Chuck Miller
March 20, 2009
Web application security spending is expected to either stay flat or increase, according to the first quarterly Security Spending Benchmarks Report published Thursday by the Open Web Application Security Project.
Web apps account for 80 percent of internet vulnerabilities
Angela Moscaritolo
March 18, 2009
Vulnerabilities in web applications made up 80 percent of all web-related flaws in the second half of 2008 and rose in prevalence by about eight percent from the first half of the year.
InfoSec: Cybersecurity expert says preparation key to business survival
Greg Masters
March 13, 2009
The world is more interconnected than ever before, so security pros have opportunities to make a difference in their enterprises, a former White House cybersecurity adviser told a group of CSOs.
Senate report calls for new U.S. cybersecurity effort
Chuck Miller
February 20, 2009
A new report released this week by the U.S. Senate's Homeland Security and Governmental Affairs Committee calls for a concerted national effort to overcome cybersecurity threats to the United States.
Data Privacy Day celebrates the safeguarding of information
Angela Moscaritolo
January 28, 2009
Companies around the globe are recognizing the second annual Data Privacy Day on Wednesday with seminars and other events aimed at educating users and generating discussion around the topic.
NIST releases draft guidelines for data protection
Angela Moscaritolo
January 15, 2009
NIST this month released draft recommendations that federal agencies -- and their contractors -- should follow to protect the confidentially of personally identifiable information.
Public and private sectors join in cyberattack simulation
Angela Moscaritolo
December 19, 2008
A simulation this week demonstrated the need for better collaboration among public and private security groups.
Amero will not face new trial in teacher porn case
Dan Kaplan
November 24, 2008
The former Connecticut substitute teacher who was accused of exposing middle-school students to internet pornography has avoided prison time and a new trial.
French President Sarkozy's bank account hacked
Angela Moscaritolo
October 20, 2008
Security professionals weigh in on what may have caused the most recent high-profile personal account breach -- this one involving French President Nicolas Sarkozy.
Study: Hotel network security lacking
Angela Moscaritolo
October 06, 2008
Hotel guests across the country could be connecting their laptops to an insecure connection, a new study concludes.
New certification to stress software lifecycle safety
Chuck Miller
September 25, 2008
The movement to create secure software received a boost with the launch of a new certification from (ISC)2, called the Certified Secure Software Lifecycle Professional, designed to validate secure software development practices.
Higher learning
Dan Kaplan
June 18, 2008
Advanced degrees in information security are popping up with increasing frequency, but are they worth the time? Cynthia Phillips at Brandeis says yes, reports Dan Kaplan.
2008 Salary and career survey: More than money
Illena Armstrong
June 18, 2008
Information security pros neither face wage boons nor badlands this year, reports Illena Armstrong.
Floods, tornadoes may encourage internet trickery
Dan Kaplan
June 13, 2008
The deadly twisters that ripped through Kansas this week and the historic floods sweeping across the Upper Midwest will soon give rise to donation scams and malicious attacks, the SANS Storm Center warned on Friday.
Bank of New York Mellon loses data on 4.5 million
Dan Kaplan
May 22, 2008
Three months after an unencrypted backup tape goes missing, 4.5 million Bank of New York Mellon customers are notified their identities may be at risk.
NSA's website outage due to lack of topological "diversity"'
Jim Carr
May 16, 2008
An easy-to-fix -- but often overlooked -- problem most likely took the National Security Agency's website and its mail services down for six or seven hours on Thursday.
Ten universities join information assurance program
Dan Kaplan
May 15, 2008
The National Security Agency (NSA) on Thursday announced that 10 new colleges have been designated National Centers of Academic Excellence in information assurance.
From Interop: Be mindful of vendors' motives
Dan Kaplan
April 30, 2008
IT security vendors' sole purpose is to generate revenue -- not offer complete security -- and they will only create solutions to stop dangerous threats when they are incentivized to do so, the principal security strategist for IBM Internet Security Systems said Wednesday at Interop in Las Vegas.
Another one bites the dust
Danielle Zeedick, Norwich University April 15, 2008
Mapping the tragedy of the Hannaford breach in a post-mortem sense should be just as important to the grocery chain as the upgrade of the system.
Latest News
Senate debates DHS, reporting responsibility post Stuxnet
Malaysian man charged with hacking into bank systems
SC Congress Canada slideshow
McAfee CEO: Get ready for tidal wave of mobile attacks
Web applications remain a pressing concern
Stoddart: Handle data in "thoughtful, systematic" way
Thinking outside the box for threat intelligence
Mobile application threat not here yet, but it's on the way
Consider privacy when deploying smart grid technology
Virtual Segmentation - Beyond the Firewall
Most Popular
Most Emailed
Most Recent
Adobe to issue emergency updates for Reader, Acrobat
Ten years of evolving threats: A look back at the impact of notable malicious wares of the past decade
McAfee CEO: Get ready for tidal wave of mobile attacks
Thinking outside the box for threat intelligence
Mobile application threat not here yet, but it's on the way
Software assurance has reached a crisis point
Senate debates DHS, reporting responsibility post Stuxnet
Web applications remain a pressing concern
Malaysian man charged with hacking into bank systems
Consider privacy when deploying smart grid technology
Trojan found disguised as Microsoft anti-virus product
Facebook, Twitter fail latest security assessment
Federal gov't releases draft cloud security guidelines
Firefox zero day being exploited in the wild
Indiana attorney general sues WellPoint over breach
Law enforcement of cybercrime: Bringing justice
Breaches cost health care industry $6 billion annually
Firefox add-on allows session hijacking of popular sites
SC World Congress continues success in its third year
Eight questions CIOs should ask on cloud security
Senate debates DHS, reporting responsibility post Stuxnet
Malaysian man charged with hacking into bank systems
SC Congress Canada slideshow
McAfee CEO: Get ready for tidal wave of mobile attacks
Web applications remain a pressing concern
Stoddart: Handle data in "thoughtful, systematic" way
Thinking outside the box for threat intelligence
Mobile application threat not here yet, but it's on the way
Consider privacy when deploying smart grid technology
Virtual Segmentation - Beyond the Firewall
Popular Topics
Adobe
Apple Threats
Application Security
Awareness Training
Breaches & Exposures
Counterintelligence
Critical Infrastructure
Cyber Attacks
Cyber Threat Intelligence
Cybercrime
Cyberespionage
Data Breaches
Data Theft
Email Security
Finance
Government
Hackers
Industrial Espionage
Malware
Mobile Endpoint Security
Mobile Security
Patch Management
Stuxnet
Threat Information
Vulnerabilities & Flaws
Sponsored Links