SearchSecurity

New & Notable

Evaluate

How Google aims to improve Android app security

Google's new security platform, Google Play Protect, looks to decrease Android app security threats through machine learning. Michael Cobb explains how the new platform works.

Manage

Expanding web security testing to server environments

Web application security is crucial, but enterprises also need to look below that layer for web server vulnerabilities. Kevin Beaver explains how to look for common weaknesses.

News

October Patch Tuesday squashes zero-day

The top priority for Microsoft's October 2017 Patch Tuesday goes to a Windows zero-day vulnerability, but IT should also beware of two publicly disclosed flaws.

Manage

Using the cloud won't protect you from ransomware

Storing data in the cloud isn't a sure-fire ransomware defense method. Expert Rob Shapland examines how the cloud helps and hurts when it comes to ransomware attacks.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Information Security Basics

View All Get Started

Blog: Security Bytes

Sections from across SearchSecurity

  • News

    View All
  • Web server threats and application attacks

    Credit reporting websites deliver malvertising

    Security researchers find drive-by download attacks affecting both Equifax and TransUnion, but Equifax claims systems were not compromised in the website hack.

  • Information security laws, investigations and ethics

    DOJ asks tech firms to encrypt 'responsibly'

    News roundup: The DOJ calls for 'responsible encryption' to comply with court orders. Plus, there's more bad cybersecurity news for banks, and Accenture data in AWS gets exposed.

  • Government information security management

    Hacking voting machines is too easy, DEFCON says

    The first official report on voting machine hacking from DEFCON suggests the need for pen testing, basic security guidelines and cooperation from local and federal governments.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close