SearchSecurity

New & Notable

News

Microsoft cybersecurity strategy: Time for another Bill Gates email

Opinion: Executive Editor Eric Parizo says Microsoft's security strategy may have once been the benchmark for other vendors to emulate, but in 2015 the software giant's priorities lie elsewhere.

News

Cloud security investments spike prior to RSA Conference 2015

Top venture capital firms and IT companies have invested more than $200 million total on several cloud security startups in recent weeks, particularly the emerging field of cloud access security brokers.

News

Patch Tuesday, exploit Thursday: Windows HTTP.sys flaw under attack

A critical vulnerability in Windows HTTP.sys was detailed as part of Microsoft's April Patch Tuesday, and the flaw is already being actively exploited in the wild.

Get Started

The top full disk encryption products on the market today

Full disk encryption can be a key component of an enterprise's desktop and laptop security strategy. Here's a look at some of the top FDE products in the industry.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    evil twin

    An evil twin, in security, is a rogue wireless access point that masquerades as a legitimate hot spot.

  • Get Started

    Android end of life: How it impacts enterprise BYOD

    When mobile vendors stop maintaining security on their devices, enterprise data is at risk. Expert Michael Cobb discusses how to assess mobile product end of life and how to create end-of-life policies and controls to maintain BYOD safety.

  • Get Started

    Ways to secure Web apps: WAFs, RASP and more

    Protecting a Web application increasingly means tuning your protections to the individual characteristics of your applications. There’s more than one way to go about this, though. In this three-part guide we review best practices for taking your Web...

View All Get Started

Sections from across SearchSecurity

  • News

    View All
  • Security patch management and Windows Patch Tuesday news

    Exploit surfaces for Windows HTTP.sys flaw

    A critical vulnerability in Windows HTTP.sys was detailed as part of Microsoft's April Patch Tuesday, and the flaw is already being actively exploited in the wild.

  • Security Industry Market Trends, Predictions and Forecasts

    Opinion: For Microsoft, security no longer a priority

    Opinion: Executive Editor Eric Parizo says Microsoft's security strategy may have once been the benchmark for other vendors to emulate, but in 2015 the software giant's priorities lie elsewhere.

  • Security Industry Market Trends, Predictions and Forecasts

    Is IoT really an enterprise security risk?

    News roundup: The Internet of Things has taken the industry by storm, but are its risks warranted? Verizon doesn't think so. Plus: #GenMobile's lax security attitude; hacking airplanes; cybersecurity skills gap continues.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close