FaceBook, Twitter, LinkedIn -- Social-networking sites are now used both as recruitment tools for new talent and as screening sites for potential employees. As such, information security professionals should be careful to cultivate the right image on these and other popular sites.
Know what scares security expert John Pescatore the most? The image of a remote employee sitting a home office or public setting, plugging into an unsecured network, accessing critical data via a personal laptop or PDA.
Organizations have never had so many security risks in so many remote locations, says Pescatore,...
Federal rules now require institutions to manage their data so it can be produced quickly and completely if demanded by district court cases.
In this session Deputy CISO David Matthews will use his first-hand experience to provide your organization up to date information and documents on:
Compliance with Federal...
Facebook, Linkedin, Twitter.com. These are just a few of the most popular social networking websites that are used extensively to find, meet and greet new people through a vast array of advanced web tools.
Social networking sites allow individuals and organizations to build communities. But just as social...
There's something new in the air that retailers, especially the directors of information technology (IT) operations at the store, are starting to research and implement called "application whitelisting". This technology is being presented as the panacea for Payment Card Industry (PCI) compliance, and is being welcomed...
In recent years, the hacking community has shifted its efforts toward a new frontier: the application layer. With most companies spending thousands, if not millions, of dollars securing the perimeter with network firewalls, intrusion prevent systems, and other devices, hackers have realized the lowest hanging fruit...
Sahba Kazerooni is a senior security consultant with Security Compass, a security consulting and training firm specializing in application security based in New Jersey. He is also an internationally-renowned speaker on security topics, and has provided presentations at security conferences around the world, including...
Interview with Cyber Crime Expert Eric Fiterman
In the wake of the arrests of 11 hackers tied to the TJX data breach, security experts everywhere are warning of bigger, bolder threats to come.
So, what should banking institutions have learned from TJX-style breaches, and what can they do now to protect their...
Since January 2005, over 167 million credit card numbers have been exposed due to security breaches. Many of the most damaging breaches were the result of hackers exploiting flaws in software. With the PCI Security Standard Council's regulations recently expanding to include specific mandates to assess software for...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.