Pizza isn't typically a topic of conversation in company meetings at Caterpillar, the world's largest maker of construction and mining equipment, diesel and natural gas engines, and industrial gas turbines. But a recent unfortunate incident involving Domino's Pizza had a special team tasked with protecting Caterpillar's brand integrity taking notes and buzzing about how quickly a simple video can suddenly drag a massive corporate name through the mud.
Stories by Joan Goodchild
Business continuity planning has evolved from simply something companies hope never to roll out, to an important focus of security operations, according to a new survey from AT&T.
Chris Nickerson is willing to push it about as far as a person can go when it comes to security assessments. The founder of Lares, a security consultancy in Colorado, Nickerson conducts what he calls "Red Team Assessments" for clients. He is paid to try and dupe a client, and the client's employees, to give them a clear picture of the weak spots in their security plan. He then advises them on how to shore up defenses more effectively in the event a real criminal comes knocking.
If you think the biggest threat to your sensitive information lies in network security, think again. Once a criminal is inside a building, there are limitless possibilities to what that person can access or damage. Take a look at your building's security. How easy is it to get inside?
It's been almost 15 years since David Kent first came to Genzyme, a biotech firm headquartered in Cambridge, Mass., that develops medical treatments for ailments such as certain genetic diseases and some forms of cancer. In 1994, the company had less than $200 million in sales, and only about 1,000 employees-a stark contrast to its worldwide workforce of 11,000 today and the $4.6 billion in revenue it reported in 2008.
The vast majority of web sites have a security vulnerability, according to data released Monday by WhiteHat Security, a security and audit provider specializing in web application security.
While many working Americans are heading into the office and starting their day, spammers are busy, too, readying for their next onslaught of junk messages. According to a new report from Symantec, spammers favor the same work schedule as the typical American office worker.
<em>There is an old saying that "a problem shared is a problem halved." In security, shared information can be elusive as risk professionals keep their cards close to their chest. But today's challenging business environment puts a premium on finding practical solutions to the tasks every CSO faces.</em>
Security is on the minds of companies and many are still making room in their budgets to invest in IT security initiatives, according to a survey released Monday by Robert Half Technology.
A look at some common security no-nos committed frequently by mobile workers, and tips on how to stop them.
Research from MarkMonitor finds 80 percent of "abusive sites" identified in 2007 remain active; US, UK and Germany host the most.
In this new age of data protection, where most information is stored digitally and paper shredding is commonplace, you don't need to worry about private information ending up in the garbage, right? Steve Hunt shows that assumption is just plain wrong.
What do Tom Cruise and the McCain campaign have in common? They have both been bitten by the loss of a Blackberry. Mobile expert Dan Hoffman gives advice on how to keep your cherished mobile device safe, even if it's out of your hands.
A warning to those who love such social media sites as Facebook: The bad guys are coming for you.
A new Symantec report reveals just how large and sophisticated the online underground economy has grown.