Security News

FDIC: Improve Vendor Management
2013-09-10 06:40

http://www.bankinfosecurity.com/fdic-improve-vendor-management-a-6053 By Tracy Kitten Bank Info Security September 9, 2013

Hacker Holes in Server Management System Allow 'Almost-Physical' Access
2013-07-03 07:39

http://www.wired.com/threatlevel/2013/07/ipmi/ By Kim Zetter Threat Level Wired.com 07.02.13

CFP 7th IFIP WG 11.11 International Conference on Trust	Management
2012-09-25 09:20

Forwarded from: Francisco Moyano ** APOLOGIES FOR CROSS POSTINGS** IFIPTM 2013- Call for Papers  7th IFIP International Conference on Trust Management Málaga, Spain 3-5 June 2013...

3 security mistakes your management is making now
2012-09-06 08:46

http://www.infoworld.com/d/security/3-security-mistakes-your-management-making-now-201624 By Roger A. Grimes InfoWorld SEPTEMBER 05, 2012

Getting the most out of automated IT security management
2012-01-10 07:48

http://gcn.com/articles/2012/01/09/nist-scap-automated-security-management.aspx By William Jackson GCN.com Jan 09, 2012

NIST offers tips on security configuration management
2011-08-17 06:54

http://gcn.com/articles/2011/08/16/nist-configuration-security-rules.aspx By William Jackson GCN.com Aug 16, 2011

NASA OIG: Annual Report, "Federal Information Security Management Act: Fiscal Year 2010 Report from the Office of Inspector General
2010-11-15 06:15

http://www.spaceref.com/news/viewsr.html?pid=35306 Source: NASA Office of Inspector General Posted Friday, November 12, 2010 Annual Report, "Federal Information Security Management Act: Fiscal...

Information Security Leaders - Career Management Survey
2008-09-22 06:05

http://www.infosecleaders.com/ Objective: The purpose of this independent research is to survey the entire spectrum of Information Security professionals, with a variety of skill sets, and at...

Five mistakes of vulnerability management
2006-01-12 09:26

http://www.computerworld.com/securitytopics/security/story/0,10801,107647,00.html Opinion by Anton Chuvakin JANUARY 11, 2006 COMPUTERWORLD Vulnerability management is viewed by some as an esoteric...

Risk management seen as key to IT security
2004-03-12 06:59

http://www.computerworld.com/securitytopics/security/story/0,10801,90987,00.html By Kathleen Melymuka MARCH 10, 2004 COMPUTERWORLD PALM DESERT, Calif. -- In IT security, emotional reactions, panic...