Letters
We’re always happy to hear from you, our readers. Please send your comments, praise or criticisms to [email protected] We reserve the right to edit letters.
We’re always happy to hear from you, our readers. Please send your comments, praise or criticisms to [email protected] We reserve the right to edit letters.
“There’s a web app attack for that,” might be a suitable ad slogan for cybercriminals these days, reports Chuck Miller.
As an increasing number of patient medical records go digital, health care security pros face some trying times, reports Illena Armstrong.
Rob Housman of the Cyber Secure Institute advocates using only the best IT to prevent attacks, reports Dan Kaplan.
The convergence of physical and logical security continues, but vital steps must still be taken, reports Angela Moscaritolo.
Information security as an industry sees a profusion of mergers and acquisitions. But one interesting effect from it is the need to re-evaluate the variety of business practices under which each individual business once operated before the transaction, so that refinements and more sweeping changes can be implemented and followed after they merge.
Security and privacy incidents pose real risks to companies of any size and complexity.
Clampi (aka Ligats or Ilomo) is an information theft botnet. The malcode is a multicomponent tool that injects code into running processes, alters the PC’s configuration and, once established, begins to harvest and send sensitive information from the PC to its handlers.
We should not require all vulnerabilities to be remediated by patching, says Michael Chernin.