SearchSecurity

New & Notable

News

Encryption everywhere: Debating the risks and rewards

News roundup: As the industry responds to growing demand for end-to-end Internet encryption, some fear unintended consequences. Plus: Black hats wanted; Windows Phone survives Pwn2Own; webcam spying resurgence.

Evaluate

The fundamentals of FDE: The business case for full disk encryption

Expert Karen Scarfone outlines the benefits of FDE to help businesses decide if the storage encryption technology is right for their organization.

Get Started

Using known-good technologies for enterprise threat detection

When it comes to threat prevention and detection in the enterprise, 'known good' technologies can be critical, yet also introduce complexity. Learn whether known-good security can bolster your security program.

News

Staples breach update: Cyberinsurance may cover retailer's costs

A new report links the Staples security breach to an intrusion at craft retailer Michaels. Meanwhile, Staples confirmed it had purchased cyberinsurace to cover the still unknown cost of its breach.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    encryption

    Encryption is the conversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties.

  • Get Started

    firewall

    A firewall is a network security system, either hardware or software based, that controls incoming and outgoing network traffic based on a set of rules.

  • Get Started

    Threat prevention: Finding 'known good' technologies

    When it comes to threat prevention and detection in the enterprise, 'known good' technologies can be critical, yet also introduce complexity. Learn whether known-good security can bolster your security program.

View All Get Started

Multimedia

Videos, Podcasts and Photo Stories

Sections from across SearchSecurity

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close