SearchSecurity.com experts discuss whether one security professional’s security policies are draconian, how new deal making among security vendors could affect the market and whether employees should be denied access to social networks at the workplace.
Gary McGraw and Sammy Miguez of CIgital talk about the latest version of the Building Security in Maturity Model (BSIMM). Thirty major companies were interviewed to find out how the firms implement security into their software development processes.
The incident response process can be difficult when short staffed. In this tip, learn how to put together a computer security incident response team by leveraging other departments in your organization.
Paul Fletcher, chief software architect of Symantec Hosted Services talks about the latest ways antispam vendors are staying a step ahead of spammers. The biggest threat is targeted spam campaigns that include malicious code.
Kevin McDonald of the Irvine, Calif.-based network, security and managed services consulting firm Alvaka Networks explains why his designation as a “business associate” has given him greater HIPAA compliance challenges. He spoke recently to SearchSecurityChannel.com’s Billy Hurley.
Julio Gonzalez, director of IT, GRC and network operations at Ryder Truck Rental, talks about the company’s PCI compliance project, aimed at addressing any credit card exposures. In this interview, conducted at Infosec World 2010 by SearchMidmarketSecurity.com’s Billy Hurley, Gonzalez talks about the relief of outsourcing, the challenges of working with an auditor and the framework he has set up for future regulations.
In this edition of Security Squad, the editors talk about a study looking at security spending priorities, a study that shows 88% of firms have machines with a botnet infection, and the one year anniversary of the No More Free Bugs campaign.
Listen to the top security experts and learn about the latest cybersecurity research. Whether it’s the spread of malware, the explosion of spam or hackers exploiting flaws to steal sensitive data, this podcast series aims to find the right ways to defend against ongoing attacks to your systems.