SearchSecurity

New & Notable

News

Survey shows security compliance confusion by C-suite

A new survey uncovered confusion in the C-suite about governance, risk and compliance responsibilities and which security compliance requirements may affect companies.

News

Avalanche global crimeware network dismantled

Authorities from 30 countries have dismantled Avalanche, the crimeware-as-a-service network used to steal hundreds of millions from victims around the globe.

News

Patched Tor vulnerability may be linked to FBI

News roundup: Tor browser patches de-anonymizing vulnerability. Plus, Senators ask Obama to release information on Russia's impact on the election, Mirai botnet for rent and more.

Get Started

How to craft a data obfuscation architecture

Expert Ajay Kumar revisits the topic of data obfuscation techniques and explores the architectures, approaches and best practices for protecting enterprise data.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Information Security Basics

  • Get Started

    How to craft a data obfuscation architecture

    Expert Ajay Kumar revisits the topic of data obfuscation techniques and explores the architectures, approaches and best practices for protecting enterprise data.

  • Get Started

    Test your understanding of managing privileged access

    Test your proficiency in privileged user management. Take this quiz to determine your ability to keep privileged access secure across your organization.

  • Get Started

    Rowhammer

    Rowhammer is a vulnerability in commodity dynamic random access memory (DRAM) chips that allows an attacker to exploit devices with DRAM memory by repeatedly accessing (hammering) a row of memory until it causes bit flips and transistors in adjacent...

View All Get Started

Blog: Security Bytes

Sections from across SearchSecurity

  • News

    View All
  • Alternative OS security: Mac, Linux, Unix, etc.

    Tens of millions of Android users at risk

    Android app security is under attack this week with vulnerabilities in the popular app, AirDroid, and malware that steals Google account authentication tokens.

  • Information Security Policies, Procedures and Guidelines

    Survey shows security compliance confusion by C-suite

    A new survey uncovered confusion in the C-suite about governance, risk and compliance responsibilities and which security compliance requirements may affect companies.

  • Information Security Laws, Investigations and Ethics

    Avalanche global crimeware network dismantled

    Authorities from 30 countries have dismantled Avalanche, the crimeware-as-a-service network used to steal hundreds of millions from victims around the globe.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close