SearchSecurity

New & Notable

Evaluate

The case for NAC-based continuous monitoring for attack detection

In his 'Security that Works' column, Eric Cole of the SANS Institute covers how often-underutilized NAC technology can be employed in a new way: as part of a continuous monitoring effort to support attack detection.

Get Started

Security staffing: The pros and cons of untraditional hiring

Security staffing can be tricky, but talent can be found in unconventional places. Expert Joseph Granneman explains the pros and cons of hiring data analysts.

News

Situational awareness software raises surveillance questions

News roundup: City-sponsored situational awareness software use at a music festival illustrates the importance of enterprise surveillance strategy evaluation. Plus: Apache Tomcat upgrade; OpenSSL security policy; and call center security concerns.

News

Cloud computing threat intelligence platforms: The next big thing?

Following FireEye's new threat analytics platform for Amazon Web Services, are enterprises ready to embrace the benefits of cloud-based threat analytics?

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

View All Get Started

Multimedia

Videos, Podcasts and Photo Stories

Sections from across SearchSecurity

  • News

    View All
  • Information Security Laws, Investigations and Ethics

    Is it time for corporate surveillance policies?

    News roundup: City-sponsored situational awareness software use at a music festival illustrates the importance of enterprise surveillance strategy evaluation. Plus: Apache Tomcat upgrade; OpenSSL security policy; and call center security concerns.

  • Web Server Threats and Countermeasures

    Weak security processes cause Healthcare.gov incidents

    Experts say the latest security breach of the Healthcare.gov website was caused by lacking security process maturity, downplaying the importance of website security testing.

  • Information Security Jobs and Training

    Women can succeed in infosec with nontraditional paths

    Facebook's director of security operations says women can have successful careers in information security, and more diversity can help shift the playing field toward security defenders rather than attackers.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close