Security Bytes:

May, 2012


May 31, 2012  12:05 PM

Why execs really need corporate security training

Jane Wright Jane Wright Profile: Jane Wright

After working hard to create sound security policies, it's easy for enterprise information security managers to be dismayed when users ignore the rules and knowingly bypass security controls. When those rule-breakers are executives, it feels like salt on the wound. After all, who should understand...

May 30, 2012  3:10 PM

Patriot Act cloud study debunks idea that location can protect cloud data from government

Marcia Savage Marcia Savage Profile: Marcia Savage

A bane for U.S.-based cloud providers for several months now has been the assumption among cloud customers and service providers outside the U.S. - especially in Europe - that the Patriot Act gives the U.S. more access...


May 24, 2012  1:24 PM

Lookingglass’ ScoutVision adds visibility in managing partner security risks

Robert Westervelt Robert Westervelt Profile: Robert Westervelt

For years, the mantra of the security industry has been to get enterprises to look internally for weaknesses and activity that can raise a red flag to a malware-infected machine or an employee with malicious intentions. But


May 24, 2012  12:27 PM

A bold view on prioritizing computer security laws

Jane Wright Jane Wright Profile: Jane Wright

Ethical hackers hired by an organization to assess its vulnerabilities must always be careful to not "cross the line" and get themselves into trouble with the law. With all the


May 23, 2012  1:49 PM

Officials name FedRAMP cloud security assessors

Robert Westervelt Robert Westervelt Profile: Robert Westervelt

It's anyone's guess how the FedRAMP cloud security initiative will pan out, but the pieces are coming together. Last week, the U.S. General Services...


May 17, 2012  1:02 PM

Division of CISO responsibilities may prevent burnout

Jane Wright Jane Wright Profile: Jane Wright

Chief information security officers have a lot on their plate. Between data protection, malware detection, compliance regulations, social media security,


May 16, 2012  9:27 PM

Peter Kuper: VCs renewing their love affair with security companies

Michael Mimoso Profile: maxsteel

Information security spending is thought to be recession proof, but does it have the legs to outrun the current downturn? In-Q-Tel partner Peter Kuper thinks so, but there...


May 16, 2012  2:52 PM

Cloud security issues: Provider transparency, data-centric security

Marcia Savage Marcia Savage Profile: Marcia Savage

At an event last week in San Francisco that covered a variety of cloud security issues, infosec expert Kevin Walker told attendees to be aggressive with cloud...


May 10, 2012  1:01 PM

Going after the middlemen in the fight against financial cybercrime

Jane Wright Jane Wright Profile: Jane Wright

In the world of financial cybercrime, there are three primary groups of fraudsters at work. First up are the developers who write the applications to grab credit card and bank...


May 9, 2012  5:59 PM

Organizations lagging on cloud security training, survey shows

Marcia Savage Marcia Savage Profile: Marcia Savage

Symantec recently released some interesting findings from a survey the company conducted with the Cloud Security Alliance at the CSA Summit in February. The survey went beyond the usual sorts of basic...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: