Security Wire Weekly:

May, 2010

1

May 30, 2010  2:13 PM

Draconian security measures or sound policy?

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

SearchSecurity.com experts discuss whether one security professional’s security policies are...

May 27, 2010  2:07 PM

Preparing for future data security laws

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Richard Mackey of SystemExperts explains how solution providers can position their customers' technological and risk-based controls so that they are ready for future data protection laws.


May 20, 2010  9:10 PM

Create a data breach response plan in 10 easy steps

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Threat MonitorHaving a solid data breach response plan in place can make the threat of a security breach less intimidating. In this tip, learn 10 steps to an effective...


May 17, 2010  2:03 PM

Gary McGraw on software security research

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Gary McGraw and Sammy Miguez of CIgital talk about the latest version of the Building Security in Maturity Model (BSIMM)....


May 6, 2010  6:22 PM

Defining an incident response process when short staffed

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Threat MonitorThe incident response process can be difficult when short staffed. In this tip, learn how to put together a computer security incident response team by...


May 6, 2010  1:55 PM

Antispam in the wake of targeted attacks

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Paul Fletcher, chief software architect of Symantec Hosted Services talks about the latest ways antispam vendors are...


May 3, 2010  2:13 PM

HIPAA compliance challenges

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Kevin McDonald of the Irvine, Calif.-based network, security and managed services consulting firm Alvaka Networks explains why his designation as a "business associate" has given him greater HIPAA compliance challenges. He spoke recently to SearchSecurityChannel.com's Billy Hurley.


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: