Security News
http://gcn.com/articles/2011/08/16/nist-configuration-security-rules.aspx By William Jackson GCN.com Aug 16, 2011
http://www.spaceref.com/news/viewsr.html?pid=35306 Source: NASA Office of Inspector General Posted Friday, November 12, 2010 Annual Report, "Federal Information Security Management Act: Fiscal...
http://www.infosecleaders.com/ Objective: The purpose of this independent research is to survey the entire spectrum of Information Security professionals, with a variety of skill sets, and at...
http://www.computerworld.com/securitytopics/security/story/0,10801,107647,00.html Opinion by Anton Chuvakin JANUARY 11, 2006 COMPUTERWORLD Vulnerability management is viewed by some as an esoteric...
http://www.computerworld.com/securitytopics/security/story/0,10801,90987,00.html By Kathleen Melymuka MARCH 10, 2004 COMPUTERWORLD PALM DESERT, Calif. -- In IT security, emotional reactions, panic...
http://www.computerworld.com/securitytopics/security/story/0,10801,90486,00.html By Paul Roberts FEBRUARY 25, 2004 SAN FRANCISCO -- A panel of distinguished cryptographers at the RSA Conference...