SearchSecurity

New & Notable

News

Government secures ID theft protection for OPM breach victims

The contract for identity theft and credit protection services for OPM breach victims has been awarded, but protection notifications will not be going out to OPM victims until later this month.

News

New iOS malware steals more than 225,000 Apple accounts

Security researchers discovered a new type of iOS malware that targets jailbroken devices and can allow attackers to take over the devices via iCloud.

How to use a QSA assessment to secure cardholder data

Read Mathieu Gorge’s top five tips to prepare for a PCI QSA assessment, and learn how that preparation enables a secure cardholder data environment.

News

Deception could improve IT security tools

A new report claims that deception may become a big factor in the future of IT security tools, but one expert warns that the efficacy of such tactics can diminish with popularity.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    Windows Update for Business: The enterprise effect

    While the consumer world is going Patch Tuesday-less, Microsoft is evolving its Patch Tuesday into Windows Update for Business for enterprise software. Learn what this change means.

  • Get Started

    Geofencing: Security pro and privacy con?

    Geofencing technology creates a virtual fence on employee devices, adding a crucial extra layer of security. But do privacy concerns negate the benefits of this feature? Expert Michael Cobb explains.

  • Get Started

    CSSLP (certified secure software lifecycle professional)

    The CSSLP (certified secure software lifecycle professional) is an (ISC)2 certification for security professionals who wish to strengthen their knowledge about application security throughout the software development lifecycle.

View All Get Started

Sections from across SearchSecurity

  • News

    View All
  • Information Security Laws, Investigations and Ethics

    Law enforcement will now need warrants to track phones

    The U.S. Department of Justice announced the establishment of a new policy for cell-site simulator devices that will require law enforcement to obtain warrants in order to track mobile phones.

  • Identity Theft and Data Security Breaches

    Government secures ID theft protection for OPM breach victims

    The contract for identity theft and credit protection services for OPM breach victims has been awarded, but protection notifications will not be going out to OPM victims until later this month.

  • Security Industry Market Trends, Predictions and Forecasts

    Deception could improve IT security tools

    A new report claims that deception may become a big factor in the future of IT security tools, but one expert warns that the efficacy of such tactics can diminish with popularity.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close