Print Issue: August 01, 2012
Security metrics remain elusive for many organizations, but key performance indicators, or KPIs, are achievable measurements that can help guide business planning and strategy.
Many view information sharing as an elusive quest, hampered by various roadblocks. But Georgia Tech researchers want to tear down these hurdles with a new threat intelligence system known as Titan.
Yahoo presumably took no measures to ensure sensitive stuff like customer account credentials were kept safe and sound.
Consensus needs to be developed around how critical infrastructure is defined, says Mark Clancy, managing director and CISO for The Depository Trust & Clearing Corp.
Authenticating to a SaaS application in the cloud should be simple. It now Is.
Security veteran Howard Schmidt filled a spot few others reportedly wanted: the role of U.S. cyber security coordinator. Two-and-a-half years later, he’s leaving the job, feeling accomplished.
Endpoint security today is responding to the needs of the enterprise in ways it has not in the past, says Technology Editor Peter Stephenson.
The threat of the month for August is the MS zero-day.
The evasiveness of Flame may have been what prevented traditional AV technology from catching it sooner.
Anonymous, WikiLeaks, DNSChanger, Stratfor, global cyber crime ring…and other breaking news.
Next post in Security News