New & Notable


Report: Backoff malware infections spiked in recent months

A report from security vendor Damballa shows that the Backoff malware variant has infected an increasing number of point-of-sale systems in recent months.


The fundamentals of MFA: The business case for multifactor authentication

When evaluating the business cases for MFA in the enterprise, expert David Strom says an organization must first identify which of the three operational scenarios apply to a potential implementation.


NIST SP800-82: The evolution of the ICS guide

Expert Ernie Hayden takes an in-depth look at the development of NIST SP800-82 since its birth, and what the standard includes in the most recent revision.

Get Started

Server configuration management on IaaS clouds

IaaS clouds need baseline server configuration, but real security requires enterprises to go beyond that. Expert Dave Shackleford reviews some IaaS security best practices.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    CISSP training: System architecture security

    In this CISSP Essentials Security School video presentation, Shon Harris details the first half of the Security Architecture and Design domain, including system components, system protection, CUP and memory management and more.

  • Get Started

    CISSP video: Access control topics on the CISSP exam

    In this CISSP Essentials Security School presentation, Shon Harris discusses the topics of security models, assurance evaluation and certification/accreditation in the Security Architecture and Design domain.

  • Get Started

    CISSP training: Security architecture and design

    Spotlight article: Shon Harris discusses the main topics in the CISSP domain on security architecture and design, highlighting formal architectures, system architectures, security models and system evaluation.

View All Get Started


Videos, Podcasts and Photo Stories

Sections from across SearchSecurity

  • News

    View All
  • Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions

    Will Symantec's future mirror pcAnywhere's troubled past?

    News roundup: As the trouble-ridden pcAnywhere's end-of-life nears, it highlights how Symantec snatched defeat from the jaws of victory. Plus: F-Secure raises the bar on privacy policy; Lifehacker breaking bad during Evil Week; and Americans fear ID...

  • Malware, Viruses, Trojans and Spyware

    Backoff malware infections on the rise

    A report from security vendor Damballa shows that the Backoff malware variant has infected an increasing number of point-of-sale systems in recent months.

  • Identity Theft and Data Security Breaches

    Staples confirms possible breach being inspected

    The Staples breach is suspected to have affected payment card information in an as-yet-undetermined number of the office supply chain's stores in the northeast U.S.