Federalizing Cybersecurity: Necessary or Nitwitted?
A cybersecurity bill may be filed in the U.S. Senate expanding government enforcement to the private sector. Security practitioners say more oversight of critical infrastructure wouldn't hurt. But anything more than that probably would.
Security Vendors Deserve Some Credit for Conficker Response
Sure, there was hype leading up to the Conficker catastrophe that never came. But CSO Senior Editor Bill Brenner thinks security vendors and their PR reps deserve some credit for restraint this time around.
Diary of a Data Breach Investigation
An information security manager shares the diary he kept while investigating a possible data breach.
How Twitter Improved IT Security
Zach Lanier, senior network security analyst at Harvard Business School and ringleader of the Security Twits, explains how the Twitterverse has been useful in combatting the bad guys.
- Data Security: Whose Job Is It Really?
- 3 Ways Pen Testing Helps DLP
- Conficker Activation Passes Quietly, So Far
- Group Takes Conficker Fight To New Level
- A DLP Program That May Prevent Data Theft
- Pethia: InfoSec's Challenges, Changes
- US Convicts First Foreigner of Phishing
- Symantec Warns Customers of Call Center Theft
- 4 Telecommuting Security Mistakes
- FBI: Internet Fraud Complaints Up 33 Percent
- More Headlines
- Change Topic
Data Protection
- Security Vendors Deserve Some Credit for Conficker Response
- Security Basics
- Security Tools, Templates, Policies
- Sample Internet Usage Policy - Manufacturing Company
- Sample Computer and E-Mail Usage Policy - Manufacturing Company
- Sample Clean Desk Policy
- Sample Cell Phone/PDA Use While Traveling Policy
- Federalizing Cybersecurity: Necessary or Nitwitted?
- Group Takes Conficker Fight To New Level
- Conficker Activation Passes Quietly, But Threat Isn't Over
Security Virtual Conference
Presented by CIO, CSO, and Networkworld
Attend this free, 100% online event on demand. Hear from experts on managing compliance mandates, insider threats, and much more.
How Cybercrime Has Changed
Trend Micro's Lab is analyzing 800 malware threats per hour! The bad guys are more sophisticated and have gone from nuisance crimes to attacks that make them rich. In this Webcast, hear about the latest cybercrime tactics and best practices to stay one step ahead.