SearchSecurity

New & Notable

News

Verizon's mobile persistent cookie is more trick than treat

News roundup: Verizon gave its mobile users an early Halloween trick: a cookie that cannot be erased, despite a number of privacy concerns. Also: compromising an air-gapped computer over the air; an alleged government-funded hack against a CBS ...

News

Research shows enterprises leaking shadow data to the cloud

A new study by cloud security startup Elastica shows that enterprise employees are unknowingly leaking sensitive data through cloud apps and services.

Get Started

The fundamentals of MFA: Procuring multifactor authentication

Multifactor authentication technology can be complicated. Expert David Strom explains what enterprises need to know before they invest in an MFA product.

Manage

Rich Mogull's Data Breach Triangle: Rethinking data breach prevention

Video: Rich Mogull says if you take away any one of the Data Breach Triangle's three key components, a breach becomes impossible. The Securosis CEO explains this unique perspective on data breach prevention.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    How to buy the right multifactor authentication tools

    Multifactor authentication technology can be complicated. Expert David Strom explains what enterprises need to know before they invest in an MFA product.

  • Get Started

    POODLE (Padding Oracle On Downgraded Legacy Encryption)

    POODLE (Padding Oracle On Downgraded Legacy Encryption) is a security flaw that can be exploited to conduct a man-in-the-middle attack that targets Web browser-based communication between clients and servers using Secure Sockets Layer (SSL) 3.0.

  • Get Started

    CISSP training: System architecture security

    In this CISSP Essentials Security School video presentation, Shon Harris details the first half of the Security Architecture and Design domain, including system components, system protection, CUP and memory management and more.

View All Get Started

Multimedia

Videos, Podcasts and Photo Stories

Sections from across SearchSecurity

  • News

    View All
  • Identity Theft and Data Security Breaches

    CurrentC leaks email addresses after Apple Pay dispute

    CurrentC, the retailer-backed mobile-payment platform, admitted to the breach shortly after the Apple Pay competitor was blamed for shutting down other NFC-based payment options.

  • Network Intrusion Detection and Analysis

    McAfee doubles down on threat intelligence

    Customers and partners like the new effort by the Intel-owned security vendor to integrate threat intelligence feeds with all of its existing products, but analysts are leery of lacking threat intelligence standards.

  • Identity Theft and Data Security Breaches

    Report: White House confirms breach, eyes Russia

    State-affiliated actors, possibly tied to the Russian government, are thought to be behind a newly confirmed breach of the White House's unclassified computer network.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close