-
Sergey Nivens - Fotolia
Unlock new pathways to network security architecture
Cover story: Want to shed appliances? Consolidation and new platforms hold promise for security teams.
-
Patrick van Hoecke - Fotolia
Out of control: Tackling Java endpoint vulnerabilities
Expert Michael Cobb discusses why known Java security vulnerabilities are on so many endpoints and how to contain them -- without updating Java.
-
Thinkstock
Three simple rules for talking compliance with execs
Expert Mike Chapple explains how to communicate the status of a corporate compliance program to the board, including both successes and shortcomings.
-
Photobank kiev - Fotolia
Do you know where your cloud data is being stored?
When storing data in the cloud, ignoring the physical location of cloud data is a major mistake. Learn how to prevent data location security issues.
Latest News
-
Lavabit, Silent Circle close secure email services
Lavabit and Silent Circle, both providers of secure communications for the consumer market, close under threat of U.S. government meddling.
-
Connecting to the Internet via IPv4? Turn off IPv6
Neohapsis' Scott Behrens explains how having both IPv4 and IPv6 Internet protocols enabled can lead to man-in-the-middle attacks.
-
Got mobile malware or ransomware?
FortiGuard Labs reports a 30% increase in mobile malware so far in 2013, and cautions ransomware is also making an appearance on mobile devices.
-
How can organizations prepare for DoS attacks?
Ron Meyran, Radware's director of security solutions, answers our questions about DoS attack planning and execution.
-
Black Hat USA 2013: Cryptopocalypse now?
A session by a team of crypto experts at Black Hat USA 2013 argued that RSA and Diffie-Hellman should be abandoned in favor of ECC.
- Read all the latest news
Email Alerts
Special Coverage: 2013 Gartner Security and Risk Management Summit
-
Mullen: Cyberattacks an 'existential threat' to U.S.
Adm. Mike Mullen criticized U.S. politicians for a lack of leadership on vital cybersecurity issues and called the NSA PRISM leak a 'huge breach.'
-
Featured content:
-
Buyers Guide
Buyers' guide: Enterprise antimalware
In this special series, Mike Rothman of Securosis details what to look for in winning enterprise antimalware software and appliances.
-
ISM: July/August 2013
Unlock new pathways to network security architecture
Security teams are looking at new and different ways to isolate, monitor and control traffic within their data centers and extended networks.
Exclusive video
The latest interviews, presentations, screencasts and more from SearchSecurity.com. Check out all our videos at SearchSecurity.com/videos.
-
DON'T MISS
Preparing for the CISSP exam? This practice test will offer you a preview of 20 questions pulled straight from previous exams in an effort to give you a sneak peek of what the certification exam entails.
Access today
Security Management Strategies for the CIO







