Application security is rapidly becoming the next hot focus area for information security professionals.
Momentum began to build in 2008, when Information Security Media Group's (ISMG) Application Security Survey showed that 90% of respondents saw application security as somewhat or a significant part of their...
Increasingly, digital forensics is an important element of an information security program for organizations of all types and sizes.
But where can security leaders find qualified forensics professionals? How can these professionals obtain the skills and expertise they need to be successful?
Rob Lee of Mandiant...
Removable media will be limited to mission-essential operations and only after strict compliance requirements are met, says Vice Admiral Carl Mauney, deputy commander of the United States Strategic Command.
Richard Chambers, President of the Institute of Internal Auditors (IIA) has three words of advice for organizations, executives and auditors looking to improve the role of internal audit: "Follow the risk."
In an exclusive interview, Chambers discusses:
Impact of the economic recession on internal audit;
"Systems compromised by this botnet provide the attackers not only user credentials and confidential information, but remote access inside the compromised networks," says Amit Yoran, CEO of NetWitness, which revealed the Kneber attacks.
Alex Cox, Research Consultant and Principal Analyst, NetWitness
Alex Cox, a research consultant and principal analyst at the IT security firm NetWitness, discovered last month the Kneber botnet, a variant of the ZueS Trojan that he says has infested 75,000 systems in 2,500 corporate and governmental organizations...
Spring is the season for the phishers to come and try to take advantage of to the unsuspecting public in the form of official-looking emails talking of tax refunds, as well as claims that the government has money waiting for them.
The International Biometric Performance Conference entitled Performance, Evaluation and Specification of Biometric Technologies will bring together biometric users, technology providers, integrators and evaluators.
Protecting United States borders has always been a top priority. However, what is stated as a goal of halting illegal immigration has evolved to a focus on keeping potential terrorist threats out of the US.