Best Practices: Enterprise Digital Rights Management
We preach the concept of moving toward a data-centric security model and being flexible with technology, yet many infosec pros fail to address a big, glaring gap that's staring us in the face: how data is used, stored and transferred once it gets past ...
Valve lets off some Steam about online gaming data breach
Data loss prevention: the term that fills marketing managers with joy, and infosec managers with dread. Preventing a data leak may be the top priority for the IT security team, but is DLP technology mature, and cost effective enough, to be the answer?
Posted by InfoSec News on Feb 17http://www.pcworld.com/article/250120/google_working_on_password_generator_for_chrome.html
Posted by InfoSec News on Feb 17http://www.israelnationalnews.com/News/News.aspx/152866
Posted by InfoSec News on Feb 17http://www.darkreading.com/database-security/167901020/security/news/232601045/most-small-healthcare-practices-hacked-in-the-past-12-months.html
Posted by InfoSec News on Feb 17http://www.informationweek.com/news/security/attacks/232600975
Posted by InfoSec News on Feb 17http://www.networkworld.com/news/2012/021612-rsa-crypto-256267.html
Posted by InfoSec News on Feb 17http://news.techworld.com/security/3338094/blue-coat-systems-taken-private-for-13-billion-cash/
Posted by InfoSec News on Feb 17========================================================================
by Lee J
Analysing the cyber scam that tried to fool an infosec professional's wife
PandaLabs' 2011 report puts facts and figures to what really happened last year: rising malware, cyber-activism, cyberwarfare, increasing mobile malware, more attacks on social networks and the “first large-scale attack on Mac”.