SearchSecurity

New & Notable

CurrentC breach raises questions about mobile-payment security

CurrentC, the retailer-backed mobile-payment platform, admitted to the breach shortly after the Apple Pay competitor was cited as the reason several retailers shunned other NFC-based payment options.

News

McAfee security products to gain integrated threat intelligence feeds

Customers and partners like the new effort by the Intel-owned security vendor to integrate threat intelligence feeds with all of its existing products, but analysts are leery of lacking threat intelligence standards.

Get Started

The cloud security threat-modeling process: Laying the groundwork

The cloud threat-modeling process begins with a fundamental understanding of threat management. Expert Ravila Helen White details these best practices for enterprises.

News

White House hack confirmed; state-affiliated actors suspected

State-affiliated actors, possibly tied to the Russian government, are thought to be behind a newly confirmed breach of the White House's unclassified computer network.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    POODLE (Padding Oracle On Downgraded Legacy Encryption)

    POODLE (Padding Oracle On Downgraded Legacy Encryption) is a security flaw that can be exploited to conduct a man-in-the-middle attack that targets Web browser-based communication between clients and servers using Secure Sockets Layer (SSL) 3.0.

  • Get Started

    CISSP training: System architecture security

    In this CISSP Essentials Security School video presentation, Shon Harris details the first half of the Security Architecture and Design domain, including system components, system protection, CUP and memory management and more.

  • Get Started

    CISSP video: Access control topics on the CISSP exam

    In this CISSP Essentials Security School presentation, Shon Harris discusses the topics of security models, assurance evaluation and certification/accreditation in the Security Architecture and Design domain.

View All Get Started

Multimedia

Videos, Podcasts and Photo Stories

Sections from across SearchSecurity

  • News

    View All
  • Network Intrusion Detection and Analysis

    McAfee doubles down on threat intelligence

    Customers and partners like the new effort by the Intel-owned security vendor to integrate threat intelligence feeds with all of its existing products, but analysts are leery of lacking threat intelligence standards.

  • Identity Theft and Data Security Breaches

    Report: White House confirms breach, eyes Russia

    State-affiliated actors, possibly tied to the Russian government, are thought to be behind a newly confirmed breach of the White House's unclassified computer network.

  • Security patch management and Windows Patch Tuesday news

    IBM delivers fixes for Notes, Domino flaws

    The IBM patches address several Java vulnerabilities, some of which were rated as severe, in the company's Notes and Domino platforms.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close