SearchSecurity

New & Notable

News

With liability deadline looming, EMV card adoption lags in U.S.

A major deadline for EMV card adoption is just one month away. Can chip-and-PIN and chip-and-signature technology improve payment card security and reduce fraud?

News

Zero-day detection coming to new mobile Qualcomm SoC

Qualcomm announced that its next flagship chipset will include Smart Protect, a feature designed for machine learning and zero-day detection on mobile devices.

Evaluate

How to prevent shelfware in an organization

Shelfware is an increasing concern for enterprises, but expert Mike O. Villegas has some suggestions to help combat the problem.

Evaluate

Pros and cons of key aliases in the enterprise

Amazon Web Services added support for key aliases to help improve enterprise cloud encryption key management. Learn what key aliases are and the benefits they bring to the enterprise.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    Geofencing: Security pro and privacy con?

    Geofencing technology creates a virtual fence on employee devices, adding a crucial extra layer of security. But do privacy concerns negate the benefits of this feature? Expert Michael Cobb explains.

  • Get Started

    CSSLP (certified secure software lifecycle professional)

    The CSSLP (certified secure software lifecycle professional) is an (ISC)2 certification for security professionals who wish to strengthen their knowledge about application security throughout the software development lifecycle.

  • Get Started

    watering hole attack

    A watering hole attack targets a specific group of users by infecting websites group members like to visit. The name watering hole attack is inspired by predators in the natural world who lurk near watering holes, looking for opportunities to attack...

View All Get Started

Sections from across SearchSecurity

  • News

    View All
  • Smartphone and PDA Viruses and Threats-Setup and Tools

    Zero-day detection coming to new mobile Qualcomm SoC

    Qualcomm announced that its next flagship chipset will include Smart Protect, a feature designed for machine learning and zero-day detection on mobile devices.

  • Web Security Tools and Best Practices

    Agora black market shuts down due to Tor vulnerabilities

    The Dark Web is where many shady deals can happen on the Internet, but Tor vulnerabilities have made it too risky for one of the largest online black markets to stay in business.

  • Network Device Management

    IoT security got you down? No fear, IoT services are here

    News roundup: As Internet of Things concerns become an enterprise reality, one vendor is quick to offer IoT services to combat the risks. Plus: 1% of users create 75% of the risk; Target pays up; Apple devices improperly secured in the enterprise.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close