SearchSecurity

New & Notable

Evaluate

Apple iOS 8 security features: What they mean for enterprise security

Expert Lisa Phifer discusses new Apple iOS 8 security features and potential pitfalls, as well as the enterprise security ramifications of new iOS features, including Extensions, Family Sharing and Apple Pay.

News

Adobe issues emergency weekend fix for Flash zero-day flaw

Adobe's latest Flash zero day patch came Saturday, just two days after reports that the vulnerability was being exploited by drive-by-download attacks.

News

Rackspace security push eyes managed cloud, compliance services

Rackspace hopes its new emphasis on security-centric managed cloud services will be enough to overcome past security and availability problems, as well as differentiate itself from public cloud rivals AWS and Microsoft.

Evaluate

Wi-Fi 2.0: What is 802.11u and how can it improve security?

Network security expert Kevin Beaver discusses the reality of the 801.11u standard and its ability to both improve the ease of Wi-Fi access and boost security.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Information Security Basics

View All Get Started

Sections from across SearchSecurity

  • News

    View All
  • Alternative OS security: Mac, Linux, Unix, etc.

    Critical Linux vulnerability poses remote exploit risk

    A critical Linux vulnerability, called GHOST, has been found to affect glibc versions released since 2000, and could pose a remote exploit risk on many Linux systems.

  • Security patch management and Windows Patch Tuesday news

    Adobe patches another zero-day flaw in Flash

    Adobe's latest Flash zero day patch came Saturday, just two days after reports that the vulnerability was being exploited by drive-by-download attacks.

  • Information Security Policies, Procedures and Guidelines

    Endpoints as honeypots? Ponemon says it's happening

    A Ponemon Institute report highlights the biggest risks to endpoint security, and what IT professionals plan to do to fight back, including one controversial tactic in malware protection.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close