Security ROI: 5 Practices Analyzed
by Larry Ponemon | June 19, 2013 | informationweek.com
Which security practices bring the best return on investment? Not all of the most popular practices are good for your company.
6 Steps to Secure Mobile Devices
by Eric Chabrow | June 25, 2013 | govinfosecurity.com
NIST's Revised Mobile Guidance Gets New Name for New Times
Commercial, retail buildings to drive market for remote monitoring services in intelligent buildings
by SIW Editorial Staff | May 29, 2013 | securityinfowatch.com
According to a new report from IMS Research, part of IHS Inc., commercial and retail end users will help drive the growth of remote monitoring services in intelligent buildings, accounting for more than 80 percent of an estimated $400 million market in 2016.
Feds Take A Leadership Role Toward Self-Defending Networks
by Jon Oltsik | May 28, 2013 | networkworld.com
Push for standards, continuous monitoring, and security automation may encourage industry and commercial sector collaboration and support
U.S. to help protect private companies from malicious cyberattacks
by Homeland Security News Wire | May 21, 2013 | homelandsecuritynewswire.com
The U.S. government said it will help protect private companies from cyber attacks. DHS secretary Janet Napolitano said a system is being developed which will monitor Internet traffic directed to critical infrastructure businesses and block attacks on software programs.
Why Jet Owners Don't Want to Be Tracked
by MARK MAREMONT And TOM MCGINTY | April 18, 2013 | wsj.com
Big companies and wealthy individuals normally don't discuss the threats they receive, preferring to keep their security concerns private.
Consumers Unhappy, Frustrated With Password Security: Survey
by Robert Lemos | April 25, 2013 | eweek.com
Nearly half of all consumers distrust online sites that rely on passwords for security and will abort transactions when they forget their passwords, according to a Ponemon Institute survey.
Zero-Day Vulnerabilities On The Rise, Trend Micro Report Warns
by Mickey McCarter | April 24, 2013 | hstoday.us
So-called zero-day vulnerabilities topped the list of concerns cited in a cybersecurity report on attacks observed in the first quarter of 2013, according to Trend Micro Inc., Cupertino, Calif.