Stories by Bill Brenner

Your BlackBerry's dirty little security secret

Tyler Shields, senior member of the Veracode Research Lab, spends a lot of time <a href="http://www.csoonline.com/podcast/533263">picking apart those BlackBerry devices</a> that are ubiquitous across the enterprise. What he's found may disappoint those who thought they were secure.

Written by Bill Brenner20 April 10 02:39

Schmidt: Private Sector Key to Stopping Google-style Attacks

White House Cybersecurity Coordinator Howard Schmidt says the information security community is right to be spooked by massive, coordinated attacks that recently targeted Google. But he rejects the notion that this is cybergeddon, and believes the best defense remains in the hands of the private sector.

Written by Bill Brenner08 April 10 05:19

SaaS, Security and the Cloud: It's All About the Contract

The term Software as a Service (SaaS) has been around a long time. The term cloud is still relatively new for many. Putting them together has meant a world of hurt for many enterprises, especially when trying to integrate security into the mix.

Written by Bill Brenner08 April 10 04:53

Smart Phone Attacks: Here and Now

When security vendors used to pitch articles on smart phone malware, my blood ran cold.

Written by Bill Brenner01 April 10 06:15

What Are the Most Overrated Security Technologies?

The security community has grown to depend on some basic technologies in the fight against cyber thieves, such as antivirus software and firewalls. But are practitioners clinging to tools that outlived their usefulness long ago? Were those tools ever really useful to begin with?

Written by Bill Brenner25 March 10 06:53

Why 41 Percent of You Would Fail a PCI Audit

Security vendors are launching a gazillion products this week at RSA Conference 2010, but hidden in all of those press releases are a few nuggets that illustrate the big picture trends.

Written by Bill Brenner02 March 10 04:05

What Researchers Are Learning About DDoS Tactics

A corporate security specialist on motives and tactics Jerry Mangiarelli has gained a lot of private-sector perspective on the DDoS threat over the years through his own personal research into botnets.

Written by Bill Brenner21 Jan. 10 02:25

Why Security Matters Now

Social networking and cloud computing threats abound, our annual Global Information Security Survey finds, making information security important once again to business leaders.

Written by Bill Brenner16 Oct. 09 05:06

6 Ways We Gave Up Our Privacy

Here's how privacy went the way of the dinosaur, how we let it happen and how we might be able to get some of it back

Written by Bill Brenner14 Oct. 09 06:17

7 Reasons Web sites Are No Longer Safe

Many of the sites you visit regularly and think are secure are laden with data-stealing malware. Here are seven reasons why, and advice on how to protect your systems

Written by Bill Brenner10 Sept. 09 03:59

Cloud security: time to smoke another one?

Chris Hoff, one of the most respected voices on the topic of virtualization and cloud security, once told me in an interview that people should shut up about securing the cloud because, in his opinion, there's no such thing as cloud security.

Written by Bill Brenner01 Sept. 09 04:19

8 dirty secrets of the IT security industry

Joshua Corman would seem an unlikely critic of IT security vendors. After all, he works for one. Yet Corman, principal security strategist for IBM's Internet Security Systems division, is speaking out about what he sees as eight trends undermining the ability of IT security practitioners to mount an effective defense against online outlaws.

Written by Bill Brenner18 Aug. 09 04:37

Swine flu: watching for signs of H1N1 havoc

At companies in the North America, Europe and northern Asia, swine flu may be the last thing on the minds of those in charge of security, pandemic planning and disaster preparedness. After all, it's summer and flu season is still months away.

Written by Bill Brenner23 July 09 02:14

Solving the DLP Puzzle: Survival Tips from the Trenches

It's no easy task implementing a data loss prevention (DLP) program when there's so much disagreement in the security community over what DLP entails. But those who've been through it have good news: It can be done

Written by Bill Brenner16 July 09 23:55
[]