Security Bytes:

April, 2012


April 27, 2012  5:25 PM

CISPA intelligence information sharing bill passes House, headed to Senate

Robert Westervelt Robert Westervelt Profile: Robert Westervelt

The Cyber Intelligence Sharing and Protection Act (CISPA), clears security vendors of any liability for sharing customer attack data with the government. A new cybersecurity bill designed to foster

  Bookmark and Share     0 Comments     RSS Feed     Email a friend

April 26, 2012  12:24 PM

For data security, cloud computing customers must accept a DIY approach

Jane Wright Jane Wright Profile: Jane Wright

Earlier this week, Context Information Security revealed the astonishing findings of its investigation into a sampling of four cloud service providers (CSPs) - Amazon EC2, Gigenet, Rackspace and VPS.net. Context found unpatched...


April 25, 2012  2:55 PM

Amazon cloud services: AWS Marketplace offers one-click cloud security

Marcia Savage Marcia Savage Profile: Marcia Savage

The new AWS Marketplace, launched by Amazon last week, is an interesting development on the cloud security front. The

  Bookmark and Share     0 Comments     RSS Feed     Email a friend


April 24, 2012  1:11 PM

Spam filter gets better of Microsoft SDL—almost

Marcia Savage Michael Mimoso Profile: maxsteel

You’d have to be a serious security curmudgeon to try to pick holes in the Microsoft SDL. The company’s security development lifecycle...


April 19, 2012  1:04 PM

Experts differ on European ‘cookie law’ advice

Jane Wright Jane Wright Profile: Jane Wright

Many IT managers in the U.K. are in a quandary right now as they decide how, and how far, to comply with the impending

  Bookmark and Share     0 Comments     RSS Feed     Email a friend


April 18, 2012  4:12 PM

Cloud security vendors win funding for technologies

Marcia Savage Marcia Savage Profile: Marcia Savage

The rush to the cloud can often make security an afterthought, but if recent funding announcements are any indication, the VC community wants to reverse that trend.

CloudPassage, Cloud Lock and Symplified are among the

  Bookmark and Share     0 Comments     RSS Feed     Email a friend


April 12, 2012  1:49 PM

The importance of using a full security threat definition

Jane Wright Jane Wright Profile: Jane Wright

How do you define a security threat? If you’re like most IT security professionals, your

  Bookmark and Share     0 Comments     RSS Feed     Email a friend


April 11, 2012  1:53 PM

Cloud transparency gets boost with Azure addition to CSA STAR

Marcia Savage Marcia Savage Profile: Marcia Savage

Cloud transparency remains a highly coveted but seemingly elusive wish for organizations. How can you trust a cloud provider with your data if you don't know what security...


April 9, 2012  4:49 PM

IT security and business alignment: It’s time to ease off IT security leaders

Marcia Savage Michael Mimoso Profile: maxsteel

There probably isn’t a more consistent theme we write about than the alignment of IT security with business goals: Understand your business first,...


April 5, 2012  12:32 PM

Prepare now for more stringent U.S. data privacy laws

Jane Wright Jane Wright Profile: Jane Wright

BOSTON -- Privacy is a fog rolling in over the land. That’s how Jeff Northrup, IT director of the International Association of Privacy, described personal information privacy...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: