SearchSecurity

New & Notable

Evaluate

Three things to consider before deploying a next-generation firewall

Expert contributor Mike Villegas outlines the three factors to consider when making the decision to purchase and deploy a next-generation firewall.

Manage

Understanding FDA guidance on medical device cybersecurity

Medical device security is a growing concern. Expert Mike Villegas shares how to make sense of the new FDA cybersecurity guidelines for medical device manufacturers.

News

Google security scanner bolsters secure cloud application development

Google's new cloud security scanner aims to make application vulnerability scanning easier for Google App Engine developers.

News

Google Project Zero changes fuel new vulnerability disclosures debate

Google's Project Zero has added more leeway to its vulnerability disclosure policy, but industry observers are split on whether 90 days is enough time to fix software flaws, or not enough time to manage a sensitive, resource-intensive process.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    How to mitigate security software-blocking malware

    Emerging malware, like the Vawtrak banking malware, has the ability to block enterprise antimalware measures. Expert Nick Lewis explains how to mitigate the risk.

  • Get Started

    The basics of next-generation firewalls in the enterprise

    Expert Mike Villegas explains how the integrated security platforms that are NGFWs better protect enterprise networks from attacks and intrusion.

  • Get Started

    A technical overview of IDS/IPS

    Evaluating intrusion detection technology requires an understanding of its capabilities. Get help with getting started on an intrusion system program design and uncover technical considerations your enterprise needs to know.

View All Get Started

Sections from across SearchSecurity

  • News

    View All
  • Security patch management and Windows Patch Tuesday news

    Vulnerability disclosure: Is 90 days enough for software vendors?

    Google's Project Zero has added more leeway to its vulnerability disclosure policy, but industry observers are split on whether 90 days is enough time to fix software flaws, or not enough time to manage a sensitive, resource-intensive process.

  • 3G and 4G phones not affected by NSA and GCHQ hack, says Gemalto

    The world’s largest maker of Sim cards, Gemalto, says it has “reasonable grounds” to believe it was hacked by UK and US spy agencies in 2010 and 2011

  • Email and Messaging Threats (spam, phishing, instant messaging)

    Macro viruses making a comeback

    Macro viruses haven't been popular since the early 2000s, but recent malware discoveries indicate that macro-infected Word and Excel files are on the rise.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close