Security News

http://www.wired.com/threatlevel/2013/07/ipmi/ By Kim Zetter Threat Level Wired.com 07.02.13

Forwarded from: Francisco Moyano ** APOLOGIES FOR CROSS POSTINGS** IFIPTM 2013- Call for Papers  7th IFIP International Conference on Trust Management Málaga, Spain 3-5 June 2013...

http://www.infoworld.com/d/security/3-security-mistakes-your-management-making-now-201624 By Roger A. Grimes InfoWorld SEPTEMBER 05, 2012

http://gcn.com/articles/2012/01/09/nist-scap-automated-security-management.aspx By William Jackson GCN.com Jan 09, 2012

http://gcn.com/articles/2011/08/16/nist-configuration-security-rules.aspx By William Jackson GCN.com Aug 16, 2011

http://www.spaceref.com/news/viewsr.html?pid=35306 Source: NASA Office of Inspector General Posted Friday, November 12, 2010 Annual Report, "Federal Information Security Management Act: Fiscal...

http://www.infosecleaders.com/ Objective: The purpose of this independent research is to survey the entire spectrum of Information Security professionals, with a variety of skill sets, and at...

http://www.computerworld.com/securitytopics/security/story/0,10801,107647,00.html Opinion by Anton Chuvakin JANUARY 11, 2006 COMPUTERWORLD Vulnerability management is viewed by some as an esoteric...

http://www.computerworld.com/securitytopics/security/story/0,10801,90987,00.html By Kathleen Melymuka MARCH 10, 2004 COMPUTERWORLD PALM DESERT, Calif. -- In IT security, emotional reactions, panic...

http://www.computerworld.com/securitytopics/security/story/0,10801,90486,00.html By Paul Roberts FEBRUARY 25, 2004 SAN FRANCISCO -- A panel of distinguished cryptographers at the RSA Conference...