How can I keep up to date on security issues?

jackson

It seems as if every day bring a new security threat, and I find it hard to keep up sometimes. Are there any sources/websites that are can help me keep up with security issues without draining all of my time?

Topic: Security
Answer this Question

Answers

3 total
jimlynch
Vote Up (15)

Do a google search for "it security news" and you'll find a good list of choices. I don't follow it directly, so I can't give you a recommendation. But poke around and I'm sure you'll find some helpful sites.

Agili Ron
Vote Up (13)

Hello Friends,

A security policy is a document that covers the rules and practices that you want your staff to follow when working with e-mail, browsing the Web, and accessing confidential data stored in your system. A security policy can help your organisation reduce security breaches and data loss by helping employees follow through with safe and secure computing practices.
In some cases you may find your customers and/or suppliers demand that you have a security policy in place that they can review - especially if you may be formally linking into their IT systems.

Thanks and Regards,
Agili Ron

agiliron.com

StillADotcommer
Vote Up (13)

In addition to places like IT World, I check two sites every day _ Naked Security and ThreatPost. They are both run by companies that sell security/anti-virus products, Sophos and Kaspersky respectively, but they also have a lot of up to date information and they don't just shill for their own products. 

Ask a question

Join Now or Sign In to ask a question.
A new program that encrypts files to extort money from users highlights that attackers don't need advanced programming skills to create dangerous and effective ransomware threats, especially when strong encryption technology is freely available.
Privacy campaign group Europe-v-Facebook is inviting Facebook users outside the U.S. and Canada to join a lawsuit against the company, which it alleges violates privacy laws.
The team at Mitro Labs, the developer of a password manager, is joining Twitter, and its software is being released under a free and open source license, Mitro said Thursday.
The latest release of a Microsoft security tool that's designed to stop exploits lets administrators control when third-party plugins are launched, a long favored route for attackers.
Some of those seeking to scrub their histories from the Web under Europe's "right to be forgotten" rule are being economical with the truth when making their requests, Google said Thursday.
Most USB devices have a fundamental security weakness that can be exploited to infect computers with malware in a way that cannot easily be prevented or detected, security researchers found.
A U.S. district court judge has ruled against Microsoft in the company's effort to oppose a U.S. government search warrant for emails stored in Ireland.
Hackers attacked the infrastructure of Tor, the anonymizing service, earlier this month in an incident that may have compromised a number of hidden services, according to an announcement posted today by the Tor Project's director, Roger Dingledine.
The number of government requests worldwide seeking Twitter users' data, or the removal of content, increased during the first half of 2014.
Despite greater security awareness, most C-suite executives continue to undervalue CISOs, survey shows.
randomness