New & Notable


Rogue IMSI catchers heighten enterprise cell phone security risks

News roundup: Rogue cell phone towers are popping up across the United States, heightening enterprise communication and data privacy concerns. Plus: Goodwill breach update; Adobe patches released; and security in 2025.


Home Depot data breach update: 56 million cards confirmed stolen

Home Depot said late Thursday that its recent breach involving 56 million payment cards was the result of custom-built malware, and that the company has since rolled out new POS encryption technology.


Pandora balancing cloud app security and shadow IT

Internet radio company Pandora explains how it found a strategy to embrace shadow IT and still secure cloud app usage within the company.


How to build complex passwords and avoid easy breaches

In the wake of the iCloud celebrity photo hack, expert Keith Palmgren offers advice on how to build more effective passwords and avoid easy data breaches.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    CISSP training: Authentication, identity management

    In this CISSP Essentials Security School presentation, Shon Harris discusses the main topics of the Access Control domain, including authentication technologies, identity management systems and federated identity.

  • Get Started

    CISSP training: Access control domain

    Spotlight article: Shon Harris discusses the main topics covered in the CISSP domain on access control, including authorization, authentication, identity management and more.

  • Get Started

    Start insider threat detection early in the game

    Starting the insider threat detection process when hiring new staff members can put your company ahead of the curve. Expert Joe Granneman explains what to look for to prevent insider threats.

View All Get Started


Videos, Podcasts and Photo Stories

Sections from across SearchSecurity