SearchSecurity

New & Notable

News

With liability deadline looming, EMV card adoption lags in U.S.

A major deadline for EMV card adoption is just one month away. Can chip-and-PIN and chip-and-signature technology improve payment card security and reduce fraud?

News

Zero-day detection coming to new mobile Qualcomm SoC

Qualcomm announced that its next flagship chipset will include Smart Protect, a feature designed for machine learning and zero-day detection on mobile devices.

Evaluate

How to prevent shelfware in an organization

Shelfware is an increasing concern for enterprises, but expert Mike O. Villegas has some suggestions to help combat the problem.

Evaluate

Pros and cons of key aliases in the enterprise

Amazon Web Services added support for key aliases to help improve enterprise cloud encryption key management. Learn what key aliases are and the benefits they bring to the enterprise.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    Geofencing: Security pro and privacy con?

    Geofencing technology creates a virtual fence on employee devices, adding a crucial extra layer of security. But do privacy concerns negate the benefits of this feature? Expert Michael Cobb explains.

  • Get Started

    CSSLP (certified secure software lifecycle professional)

    The CSSLP (certified secure software lifecycle professional) is an (ISC)2 certification for security professionals who wish to strengthen their knowledge about application security throughout the software development lifecycle.

  • Get Started

    watering hole attack

    A watering hole attack targets a specific group of users by infecting websites group members like to visit. The name watering hole attack is inspired by predators in the natural world who lurk near watering holes, looking for opportunities to attack...

View All Get Started

Sections from across SearchSecurity