SearchSecurity

New & Notable

Evaluate

How Shellshock transformed the future of shell security

The Shellshock Bash bug left millions of systems unsecure. Enterprise threats expert Nick Lewis discusses how the bug changed shell security for the better.

News

Emerging cyberthreats exploit battle between compliance and security

While regulatory compliance is valuable and necessary for enterprise, cyberthreat experts say that a compliance-centric security strategy may leave organizations with few resources to ward off emerging cyberthreats.

News

Big data security analytics: Can it revolutionize information security?

Demetrios Lazarikos describes the security big data system he implemented at retail giant Sears, as well as how it helped thwart retail fraud activity and how he convinced executives to support the implementation.

Evaluate

How AWS Key Management Service bolsters cloud security

The AWS Key Management Service is a good tool for cloud encryption key management. Expert Dave Shackleford examines AWS KMS and its benefits to enterprises.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Information Security Basics

View All Get Started

Sections from across SearchSecurity

  • News

    View All
  • Network Behavior Anomaly Detection (NBAD)

    Former Sears CISO talks up security big data

    Demetrios Lazarikos describes the security big data system he implemented at retail giant Sears, as well as how it helped thwart retail fraud activity and how he convinced executives to support the implementation.

  • Database Security Management

    NoSQL database security has room to mature

    NoSQL database security has taken a backseat to performance in Hadoop-based security big data analytics systems, but that may soon change thanks to growing demand and maturing NoSQL security products.

  • Identity Theft and Data Security Breaches

    Uber database breached, investigation underway

    Following the theft of data affecting about 50,000 of its drivers, Uber says it has filed a subpoena to obtain GitHub data that may pinpoint the source of its data breach.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close