SearchSecurity

New & Notable

News

Data breach consequences: Get breached, make money?

News roundup: Data breaches aren't associated with soaring stock prices, but recent examples show breaches may boost stocks. Plus: Gemalto confirms possibility of GHCQ/NSA hack; Target breach costs company $162 million; Superfish swims on.

News

HP: Threat intelligence sources need vetting, regression testing

According to HP Security Research, threat intelligence best practices can be difficult to implement, and even the most trustworthy sources must be tested for fidelity.

Evaluate

Three things to consider before deploying a next-generation firewall

Expert contributor Mike Villegas outlines the three factors to consider when making the decision to purchase and deploy a next-generation firewall.

Manage

Understanding FDA guidance on medical device cybersecurity

Medical device security is a growing concern. Expert Mike Villegas shares how to make sense of the new FDA cybersecurity guidelines for medical device manufacturers.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    How to mitigate security software-blocking malware

    Emerging malware, like the Vawtrak banking malware, has the ability to block enterprise antimalware measures. Expert Nick Lewis explains how to mitigate the risk.

  • Get Started

    The basics of next-generation firewalls in the enterprise

    Expert Mike Villegas explains how the integrated security platforms that are NGFWs better protect enterprise networks from attacks and intrusion.

  • Get Started

    A technical overview of IDS/IPS

    Evaluating intrusion detection technology requires an understanding of its capabilities. Get help with getting started on an intrusion system program design and uncover technical considerations your enterprise needs to know.

View All Get Started

Sections from across SearchSecurity