SearchSecurity

New & Notable

Evaluate

Three things to consider before deploying a next-generation firewall

Expert contributor Mike Villegas outlines the three factors to consider when making the decision to purchase and deploy a next-generation firewall.

Manage

Understanding FDA guidance on medical device cybersecurity

Medical device security is a growing concern. Expert Mike Villegas shares how to make sense of the new FDA cybersecurity guidelines for medical device manufacturers.

News

Google security scanner bolsters secure cloud application development

Google's new cloud security scanner aims to make application vulnerability scanning easier for Google App Engine developers.

News

Google Project Zero changes fuel new vulnerability disclosures debate

Google's Project Zero has added more leeway to its vulnerability disclosure policy, but industry observers are split on whether 90 days is enough time to fix software flaws, or not enough time to manage a sensitive, resource-intensive process.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    The basics of next-generation firewalls in the enterprise

    Expert Mike Villegas explains how the integrated security platforms that are NGFWs better protect enterprise networks from attacks and intrusion.

  • Get Started

    A technical overview of IDS/IPS

    Evaluating intrusion detection technology requires an understanding of its capabilities. Get help with getting started on an intrusion system program design and uncover technical considerations your enterprise needs to know.

  • Get Started

    The history of intrusion detection and prevention technologies

    Intrusion detection and preventions systems can be critical components to an enterprise's threat management strategy. Learn the history behind the technologies and why they are so important.

View All Get Started

Sections from across SearchSecurity

  • News

    View All
  • Security patch management and Windows Patch Tuesday news

    Vulnerability disclosure: Is 90 days enough for software vendors?

    Google's Project Zero has added more leeway to its vulnerability disclosure policy, but industry observers are split on whether 90 days is enough time to fix software flaws, or not enough time to manage a sensitive, resource-intensive process.

  • 3G and 4G phones not affected by NSA and GCHQ hack, says Gemalto

    The world’s largest maker of Sim cards, Gemalto, says it has “reasonable grounds” to believe it was hacked by UK and US spy agencies in 2010 and 2011

  • Email and Messaging Threats (spam, phishing, instant messaging)

    Macro viruses making a comeback

    Macro viruses haven't been popular since the early 2000s, but recent malware discoveries indicate that macro-infected Word and Excel files are on the rise.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close