Security Wire Weekly


May 30, 2010  2:13 PM

Draconian security measures or sound policy?

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

SearchSecurity.com experts discuss whether one security professional’s security policies are draconian, how new deal making among security vendors could affect the market and whether employees should be denied access to social networks at the workplace.

May 27, 2010  2:07 PM

Preparing for future data security laws

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Richard Mackey of SystemExperts explains how solution providers can position their customers’ technological and risk-based controls so that they are ready for future data protection laws.


May 20, 2010  9:10 PM

Create a data breach response plan in 10 easy steps

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Threat MonitorHaving a solid data breach response plan in place can make the threat of a security breach less intimidating. In this tip, learn 10 steps to an effective data breach response plan.


May 17, 2010  2:03 PM

Gary McGraw on software security research

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Gary McGraw and Sammy Miguez of CIgital talk about the latest version of the Building Security in Maturity Model (BSIMM). Thirty major companies were interviewed to find out how the firms implement security into their software development processes.


May 6, 2010  6:22 PM

Defining an incident response process when short staffed

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Threat MonitorThe incident response process can be difficult when short staffed. In this tip, learn how to put together a computer security incident response team by leveraging other departments in your organization.


May 6, 2010  1:55 PM

Antispam in the wake of targeted attacks

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Paul Fletcher, chief software architect of Symantec Hosted Services talks about the latest ways antispam vendors are staying a step ahead of spammers. The biggest threat is targeted spam campaigns that include malicious code.


May 3, 2010  2:13 PM

HIPAA compliance challenges

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Kevin McDonald of the Irvine, Calif.-based network, security and managed services consulting firm Alvaka Networks explains why his designation as a “business associate” has given him greater HIPAA compliance challenges. He spoke recently to SearchSecurityChannel.com’s Billy Hurley.


April 29, 2010  2:21 PM

Network Security and the cloud

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Network security expert, Michael Markulec of Lumeta Inc., on the federal government’s role in shaping future network defenses in the private sector and the influence of cloud computing on the network.


April 21, 2010  1:12 AM

Ryder Truck Rental PCI compliance project

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

Julio Gonzalez, director of IT, GRC and network operations at Ryder Truck Rental, talks about the company’s PCI compliance project, aimed at addressing any credit card exposures. In this interview, conducted at Infosec World 2010 by SearchMidmarketSecurity.com’s Billy Hurley, Gonzalez talks about the relief of outsourcing, the challenges of working with an auditor and the framework he has set up for future regulations.


April 19, 2010  2:16 PM

Bugs, budgets and botnets

Robert Westervelt Robert Westervelt Profile: Robert Westervelt

In this edition of Security Squad, the editors talk about a study looking at security spending priorities, a study that shows 88% of firms have machines with a botnet infection, and the one year anniversary of the No More Free Bugs campaign.


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: