Blogs
Subscribe to all blogsEstlick promoted at Starbucks
January 04, 2013
Dave Estlick, VP of Information Security at Starbucks, has been promoted to Vice President, Technology Infrastructure and Enterprise Security Officer. Estlick has been at Starbucks for three years and was previously Director of Information Security and Compliance at PetSmart, Inc. He has also...
Anonymous in decline? Don't bet on it
January 02, 2013
McAfee predicts a steep decline for Anonymous in 2013, but we could simply be seeing a conversion.
#FFSec: Security pros to follow on Twitter, Dec. 21
December 21, 2012
Follow these names on Twitter. Together, they make cyberspace a more secure place. (copy and paste)
It was inevitable: Malware-infested PowerPoint exploits Mayan Doomsday fears
December 20, 2012
Researchers at Sophos say a booby-trapped PowerPoint presentation titled "Will the world end in 2012?" is circulating.
FTC expands Children's Online Privacy Protection Act
December 20, 2012
New provisions in the Children's Online Privacy Protection Act cover apps, exempts 'platforms' like App Store and Google Play and requires parental approval before companies can gather kids' photos, videos or geographic location.
Dell acquires Credant Technologies
December 19, 2012
Dell says Credant Technologies will help it delve deeper into the mobile data protection market.
CIA in the Cloud
December 18, 2012
No, this isn’t a post about a secretive intelligence agency. Rather, my reference to CIA is to the well-known acronym in the information security industry to “Confidentiality, Integrity, and Availability” of data. The same language is also used in certain privacy laws. Most businesses only...
How do you keep talented security staff at your organization?
December 18, 2012
"I'm not going to be as bold as to say there is no unemployment among security professionals, but there is negative unemployment for highly-skilled security professionals.” ~ Lee Kushner.
Morgan Freeman Sandy Hook quote a hoax
December 18, 2012
It's no surprise when hoax messages flood the social networks after a big tragedy like the Sandy Hook Elementary School shootings in Newtown, Conn. The most visible example this time is a fake message attributed to Morgan Freeman.
Blue Coat acquires Crossbeam Systems
December 18, 2012
By acquiring Crossbeam, Blue Coat says it's "laying the foundation for a broader strategy to transform the way businesses secure and optimize their networks."
Previous Page
Recent Comments
Webcasts
White Papers
- Securing Mobile Devices in the Business Environment
- Managing Threats in the Digital Age
- Securing Virtualization in Real-world Environments
- Cloud-based endpoint security management for mobile devices
- Learn how to lower your GRC cost in one hour
- Mission Possible: How HP Conquers The Demon of Explosive Structured Data Growth