11/26/2013 - In Information Security Governance Simplified, author Todd Fitzgerald provides an excellent overview on how security managers can create an effective information security program without breaking the bank. He shows the reader how to create a governance program that includes all of the necessary managerial, technical, and operational controls.
11/15/2013 - The Committee on Homeland Security held a hearing on Thursday titled “Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov?” Department of Homeland Security (DHS) officials, as well as members of the private sector who work in information technology, were invited to discuss some of the security issues with Healthcare.gov.
10/28/2013 - In a report titled Threats on the Horizon: The Rise of the Advanced Persistent Threat, Fortinet takes a look at the evolution of advanced persistent threats, how they typically operate, and the actors behind this cyberattack vector.
10/25/2013 - A growing and nefarious cyberattack category, called advanced persistent threats, is a major concern for both governments and private enterprises that want to prevent their proprietary information from being stolen or damaged.
10/24/2013 - It’s a given that Bring Your Own Device policies have become a security challenge that enterprises must grapple with. Companies are turning to mobile device management (MDM) solutions to control the wealth of gadgets living on their networks.
09/30/2013 - Companies are increasingly turning to cloud-computing technology to manage their informational assets. This 2013 study by IDG Enterprise looks at facts and figures behind the types of cloud services businesses are choosing.