-
Thinkstock
Firewalls play by new rules
Modern firewalls offer greater application awareness and user controls. Protect your migration strategy with these tips from the pros.
-
vege - Fotolia
WhatIs definition: COBIT
COBIT is a framework for developing, implementing, monitoring and improving information technology (IT) governance and management practices.
-
alphaspirit - Fotolia
A smarter, programmatic approach to SOX compliance
After 11 years of Sarbanes-Oxley and other mandates, enterprises have finally embraced holistic compliance program management as a best practice.
-
Maksim Kabakou - Fotolia
Has the RC4 encryption algorithm been broken for good?
Expert Michael Cobb provides background on the RC4 encryption algorithm and determines whether a recent RC4 attack signals trouble for SSL/TLS users.
-
CISO details PCI cloud process for service providers
On the heels of Echopass achieving PCI Level 1 certification, CISO Dennis Empey offers PCI guidance for other cloud providers navigating the process.
-
September Patch Tuesday tackles Office, SharePoint
The September 2013 Patch Tuesday releases included 13 bulletins from Microsoft, four deemed critical.
-
Damballa brings HTTP request profiler to malware fight
Damballa is adding HTTP request profiling to its advanced threat protection platform to detect malware that bypasses traditional security approaches.
-
Big Data sidesteps the NYT redirect
Big data analysis of IP addresses performed by OpenDNS kept some 50 million users from falling prey to the hijacking of The New York Times website.
-
CounterTack to protect SK Infosec's endpoints
U.S.-based CounterTack in agreement to protect South Korean security firm SK Infosec's endpoints from increasingly stealthy cyberattacks.
-
Email Alerts
Special Coverage: 2013 Gartner Security and Risk Management Summit
-
Mullen: Cyberattacks an 'existential threat' to U.S.
Adm. Mike Mullen criticized U.S. politicians for a lack of leadership on vital cybersecurity issues and called the NSA PRISM leak a 'huge breach.'
-
Featured content:
-
Buyers Guide
Buyers' guide: Enterprise antimalware
In this special series, Mike Rothman of Securosis details what to look for in winning enterprise antimalware software and appliances.
-
ISM: September 2013
Next-generation firewalls play by new rules
We take a look at the key developments that define next-generation firewalls from application awareness to intrusion prevention techniques.
Exclusive video
The latest interviews, presentations, screencasts and more from SearchSecurity.com. Check out all our videos at SearchSecurity.com/videos.
-
DON'T MISS
Preparing for the CISSP exam? This practice test will offer you a preview of 20 questions pulled straight from previous exams in an effort to give you a sneak peek of what the certification exam entails.
Access today
Security Management Strategies for the CIO







