New & Notable


Blue Coat launches 'Cloud Generation' Web gateway

After acquiring two cloud access security brokers this year, Blue Coat Systems has united CASB capabilities with its Web gateway security technology under a new cloud security strategy.


Bolster midmarket defenses with penetration testing tools

The best approach for penetration testing is to use a combination of tools with different approaches. Here are several pen testing tools for midmarket companies.


Clearing up the tokenization confusion

Tokenization technology can be confusing. Expert Mike Chapple explains what the difference is between two types of tokens and how tokenization can help with PCI DSS compliance.


Cloud security: Lessons from the Department of Defense

Expert Dan Sullivan explains key takeaways from the Department of Defense's cloud security guidelines that enterprises can put into practice.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    How big data security can benefit enterprises

    Expert Dan Sullivan explains what big data security analytics is and how these tools are applied to security monitoring to enable broader and more in-depth event analysis for better enterprise protection.

  • Get Started


    Biometrics is the measurement and statistical analysis of people’s physical and behavioral characteristics.

  • Get Started

    How to close third-party security gaps

    Third-party contractors and business partners can create risks for enterprises. Expert Eric Cole offers guidance on improving supply chain security and controlling third-party risks.

View All Get Started

Sections from across SearchSecurity

  • News

    View All
  • PKI and Digital Certificates

    Dell certificate problem is the new Superfish

    Dell issued a fix for a root certificate similar to Superfish that could potentially allow attackers to intercept encrypted private data on its PCs.

  • Information Security Incident Response-Detection and Analysis

    Adobe CSO offers advice on data breach responses

    Adobe CSO Brad Arkin spoke at the recent Privacy. Security. Risk. 2015 event about his experiences dealing with the company's massive data breach two years ago.

  • Data Privacy and Protection

    More criticism of Safe Harbor 2.0 framework update

    News roundup: Rights groups join critics of Safe Harbor framework update, OPM breach testimony pushback, FBI hiring part of cybersecurity issue for Justice Department. Plus: recycled malware, Microsoft's security push.