(Go: >> BACK << -|- >> HOME <<)

Federalizing Cybersecurity: Necessary or Nitwitted?

A cybersecurity bill may be filed in the U.S. Senate expanding government enforcement to the private sector. Security practitioners say more oversight of critical infrastructure wouldn't hurt. But anything more than that probably would.

Read more


Security Vendors Deserve Some Credit for Conficker Response

Security Vendors Deserve Some Credit for Conficker Response Sure, there was hype leading up to the Conficker catastrophe that never came. But CSO Senior Editor Bill Brenner thinks security vendors and their PR reps deserve some credit for restraint this time around.

Read more

Diary of a Data Breach Investigation

An information security manager shares the diary he kept while investigating a possible data breach.

Read more

How Twitter Improved IT Security

Zach Lanier, senior network security analyst at Harvard Business School and ringleader of the Security Twits, explains how the Twitterverse has been useful in combatting the bad guys.

Read more

RESOURCE CENTER
VIRTUAL CONFERENCE
Security Virtual Conference
Presented by CIO, CSO, and Networkworld

Security VC Attend this free, 100% online event on demand. Hear from experts on managing compliance mandates, insider threats, and much more.

» Learn more and register here

WEBCAST
How Cybercrime Has Changed

Trend Micro Trend Micro's Lab is analyzing 800 malware threats per hour! The bad guys are more sophisticated and have gone from nuisance crimes to attacks that make them rich. In this Webcast, hear about the latest cybercrime tactics and best practices to stay one step ahead.

» View the webcast

 
CSO Video
 
White Papers
Featured Sponsors
Sponsored Links

Service Management Simulator: An engaging path to business success

The Visibility. Control. Automation(tm) Service Management Needs Assessment

Read RSA's DTCC Customer Case Study: Proactive Security Monitoring

Quantify your risk of data loss. Download Lumension's Device Scanner

Now is the Time to Protect Your Critical Information Assets

2009 Gartner Magic Quadrant for Static Application Security Testing

Achieving Software Security with Wipro Security Assurance Center Services

CISO's Guide to Commercial Off-The-Shelf Software (COTS)

CISO's Guide to Outsourcing

CISO's Guide to Application Security

Focus on risk and compliance will follow: Meeting the challenges of PCI DSS

Protecting What Matters: The 6th Annual Global Security Survey

Understanding Data Location is Imperative for Data Loss Prevention

The Shortcut Guide to Prioritizing Security Spending-Chapter One-Optimizing Business Driven Security

Demand more network value--41% more. Read Forrester study at juniper.net/save

Preventing Enterprise Data Loss: White Paper Reveals Best Practices

File Integrity Monitoring: Prove compliance and secure your IT environments

How Are Open Source Development Communities Embracing Security Best Practices?

Advancing Software Security Assurance in the Enterprise

CISO's Guide To Creating and Managing the Secure Development Lifecycle (SDLC)

CISO's Guide to Securing Open Source Software

CISO's Guide to Web 2.0 Security

Get Sophisticated About Your Web Application Security

10Minutes on Data & Identity Theft

New Insider Threat Emerges in the New Economy