Coverity offers Integrity Control to help manage code quality | Email users still running amok despite years of warnings

InfoWorld's Security Central

Forward this to a Friend >>>


Drop in hacked records points to craftier attacks, not better security
Verizon Business has released its 2011 Verizon Data Breach Report [PDF], and it's brimming with interesting statistics that are well worth a closer look by any security-minded IT worker. Among its findings: The total number of compromised records has dropped substantially over the past couple of years, but not because organizations have come up with a superior recipe for defending their networks. Read More


RESOURCE COMPLIMENTS OF: SafeCentral

Learn How To Secure Your VDI
With a shift to cloud computing and VDI environments, small and midsize businesses are now the main target of cybercriminals. VDIs are becoming more common but can make your environment less secure and expose you to critical data theft. Let us teach you how to protect your VDI environment. Register now for our Free Live Webinar about VDI Security!

E-BOOK: Sophos

FREE Compliance for Dummies Book from Sophos
Get 10 tips to achieve compliance. Request a book today!

Coverity offers Integrity Control to help manage code quality
Coverity is releasing on Tuesday a code governance offering intended to help software development houses manage code quality. With Coverity Integrity Control, companies can set and manage code quality and security standards and identify suppliers or teams that are introducing code risk or slowing time to market. An executive heat map offers a single-pane view of code sources, including suppliers, projects, and teams, to identify which entity is in violation of code integrity policies. Developers also can use the heat map to determine the context of a code problem. Read More

Email users still running amok despite years of warnings
Despite years of regulations, fines, corporate policies, and data leakage prevention tools, companies are still remarkably vulnerable when it comes to employees' inappropriate use of email. Read More

Microsoft shows class in disclosing Google zero-day
Still stinging from a Google engineer's untimely disclosure of zero-day attack code, Microsoft leads the way for responsible disclosure. Read More

Security lessons still lacking for computer science grads
Computer science majors have good job prospects, but the vast majority lack an understanding of security and the fundamentals of secure programming. Read More



A D V E R T I S E M E N T
Learn Best Practices for Achieving Pervasive Performance Management

This paper describes how companies can move toward pervasive performance management to drive greater competitive advantage and bottom-line results.
Download now.>>


DAILY NEWS, DELIVERED TO YOUR INBOX FIRST THING

Start your workday with Today's Headlines: First Look, and find out what the tech world will be talking about all day.
Subscribe now!


Do You Tweet?
Follow everything from InfoWorld.com on Twitter @infoworld.

You are currently subscribed to infoworld_sec_rpt as tuwanan.mono@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@infoworld.com

To contact InfoWorld, please send an e-mail to online@infoworld.com.

Copyright (C) 2011 InfoWorld Media Group, 501 Second St., San Francisco, CA 94107

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@infoworld.com **