SearchSecurity

New & Notable

Evaluate

Information security and lawyers: Three ways to be besties

Legal teams play a key supporting role in successful information security programs. Expert Mike Chapple reviews three areas where infosec pros and lawyers should work together, and offers tips to foster effective collaboration.

News

Data breach consequences: Get breached, make money?

News roundup: Data breaches aren't associated with soaring stock prices, but recent examples show breaches may boost stocks. Plus: Gemalto confirms possibility of GHCQ/NSA hack; Target breach costs company $162 million; Superfish swims on.

News

HP: Threat intelligence sources need vetting, regression testing

According to HP Security Research, threat intelligence best practices can be difficult to implement, and even the most trustworthy sources must be tested for fidelity.

Evaluate

Three things to consider before deploying a next-generation firewall

Expert contributor Mike Villegas outlines the three factors to consider when making the decision to purchase and deploy a next-generation firewall.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    How to mitigate security software-blocking malware

    Emerging malware, like the Vawtrak banking malware, has the ability to block enterprise antimalware measures. Expert Nick Lewis explains how to mitigate the risk.

  • Get Started

    The basics of next-generation firewalls in the enterprise

    Expert Mike Villegas explains how the integrated security platforms that are NGFWs better protect enterprise networks from attacks and intrusion.

  • Get Started

    A technical overview of IDS/IPS

    Evaluating intrusion detection technology requires an understanding of its capabilities. Get help with getting started on an intrusion system program design and uncover technical considerations your enterprise needs to know.

View All Get Started

Sections from across SearchSecurity

  • News

    View All
  • Identity Theft and Data Security Breaches

    Data breaches boost stock prices, but why?

    News roundup: Data breaches aren't associated with soaring stock prices, but recent examples show breaches may boost stocks. Plus: Gemalto confirms possibility of GHCQ/NSA hack; Target breach costs company $162 million; Superfish swims on.

  • Network Behavior Anomaly Detection (NBAD)

    HP: Vetting threat intelligence sources is key

    According to HP Security Research, threat intelligence best practices can be difficult to implement, and even the most trustworthy sources must be tested for fidelity.

  • Security patch management and Windows Patch Tuesday news

    Vulnerability disclosure: Is 90 days enough for software vendors?

    Google's Project Zero has added more leeway to its vulnerability disclosure policy, but industry observers are split on whether 90 days is enough time to fix software flaws, or not enough time to manage a sensitive, resource-intensive process.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close