New & Notable


How to keep a cloud database service secure

Database as a service may be easy to deploy and easy to manage, but it is not without its security challenges. Expert Ed Moyle outlines three major steps enterprises should take to secure cloud database services in the enterprise.


How pervasive sensing introduces more security risks

Pervasive sensing is a relatively new concept, but its security risks are well-developed. Expert Ernie Hayden explains this new trend and its associated security implications.


With liability deadline looming, EMV card adoption lags in U.S.

A major deadline for EMV card adoption is just one month away. Can chip-and-PIN and chip-and-signature technology improve payment card security and reduce fraud?


Zero-day detection coming to new mobile Qualcomm SoC

Qualcomm announced that its next flagship chipset will include Smart Protect, a feature designed for machine learning and zero-day detection on mobile devices.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    Geofencing: Security pro and privacy con?

    Geofencing technology creates a virtual fence on employee devices, adding a crucial extra layer of security. But do privacy concerns negate the benefits of this feature? Expert Michael Cobb explains.

  • Get Started

    CSSLP (certified secure software lifecycle professional)

    The CSSLP (certified secure software lifecycle professional) is an (ISC)2 certification for security professionals who wish to strengthen their knowledge about application security throughout the software development lifecycle.

  • Get Started

    watering hole attack

    A watering hole attack targets a specific group of users by infecting websites group members like to visit. The name watering hole attack is inspired by predators in the natural world who lurk near watering holes, looking for opportunities to attack...

View All Get Started

Sections from across SearchSecurity