SearchSecurity

New & Notable

News

Programmers unknowingly inherit development framework security issues

Developers increasingly rely on a variety of open source components, but a VerSprite researcher warns that security issues accompany many popular frameworks.

News

Apple Pay security: Hope abounds, but questions linger

Security controls integrated into the new Apple Pay mobile payment system could strengthen the payment security ecosystem, but unanswered questions remain, like the ramifications of a lost iPhone.

Evaluate

The case for NAC-based continuous monitoring for attack detection

In his 'Security that Works' column, Eric Cole of the SANS Institute covers how often-underutilized NAC technology can be employed in a new way: as part of a continuous monitoring effort to support attack detection.

Get Started

Security staffing: The pros and cons of untraditional hiring

Security staffing can be tricky, but talent can be found in unconventional places. Expert Joseph Granneman explains the pros and cons of hiring data analysts.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

View All Get Started

Multimedia

Videos, Podcasts and Photo Stories

Sections from across SearchSecurity

  • News

    View All
  • Software Development Methodology

    Researcher: Security flaws inherent in open source frameworks

    Developers increasingly rely on a variety of open source components, but a VerSprite researcher warns that security issues accompany many popular frameworks.

  • Identity Theft and Data Security Breaches

    How secure will mobile payments be using Apple Pay?

    Security controls integrated into the new Apple Pay mobile payment system could strengthen the payment security ecosystem, but unanswered questions remain, like the ramifications of a lost iPhone.

  • Information Security Laws, Investigations and Ethics

    Is it time for corporate surveillance policies?

    News roundup: City-sponsored situational awareness software use at a music festival illustrates the importance of enterprise surveillance strategy evaluation. Plus: Apache Tomcat upgrade; OpenSSL security policy; and call center security concerns.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close