-
How to prepare for a FERPA audit
Does your educational institution have to comply with FERPA? David Mortman, security management expert, explains what FERPA requires for school records and what to do when your FERPA audit is right...31 Jul 2009
-
Next generation spam: New threats and new technologies
This video examines the evolution of the content security gateway as it evolves beyond just blocking spam and Web filtering, emphasizing the techniques and technologies used to ensure data doesn't ...31 Jul 2009
-
Researchers say search, seizure protection may not apply to SaaS data
Researchers examining cloud computing security issues presented a number of technical and legal hurdles that Software as a Service users could face.31 Jul 2009
-
DoD urges less network anonymity, more PKI use
U.S. Department of Defense CISO Robert Lentz went down a laundry list of security technologies needed to protect both private and government networks from cybercriminals. The age of anonymity on ne...30 Jul 2009
-
MMS messaging spoof hack could have global ramifications
Researchers have figured out a way to spoof sender numbers, bypass carrier protections and trick mobile devices to pull content from an attacker's server. This would leave users vulnerable to phish...30 Jul 2009
-
WASC Web Honeypot Project enters next phase
Ryan Barnett of Breach Security and leader of the WASC Honeypot Project talks about phase three of the project, which uses an open proxy server to analyze Web attack data.30 Jul 2009
-
McAfee to acquire email SaaS vendor MX Logic
McAfee will acquire MX Logic, one of the few remaining independent email security SaaS vendors, for $140 million in cash in a deal announced Thursday.30 Jul 2009
-
Machiavelli Mac OS X rootkit unveiled at Black Hat
Researcher Dino Dai Zovi presented details on a rootkit called Machiavelli, a proof-of-concept Mac OS X rootkit that seeks to dent what many Mac enthusiasts believe is an impervious OS.30 Jul 2009
-
New Cisco IOS bugs pose tempting targets, says Black Hat researcher
VoIP implementations, basic coding within the devices and few router security features have made them an increasingly attractive target.30 Jul 2009
-
Quiz: Automated compliance in the enterprise
Use this five-question quiz to test your knowledge of automated compliance in the enterprise.30 Jul 2009
-
Expert: Information security spending often restricts innovation
In the opening keynote at the Black Hat USA 2009 conference, a former Google executive urged security pros to stop spending money on technologies that place restrictions on employees and instead em...29 Jul 2009
-
Kaminsky reveals key flaws in X.509 SSL certificates at Black Hat
Researcher Dan Kaminsky returned to Black Hat with new research on X.509 certificates, explaining an attack method that could enable malicious hackers to spoof legitimate SSL certificates..29 Jul 2009
-
Panda reports fast-spreading rogueware antivirus fraud rakes in millions
Rogueware fake antivirus strains are increasing at a stunning rate. Panda Security reports that this cyber crime bilks users out of about $34 million every month.29 Jul 2009
-
Microsoft kill-bits, browser plug-ins pose big risks, say Black Hat researchers
Researchers at Black Hat say complex interoperability flaws affect browser plug-ins that transmit data between different components of an OS. The holes could be exploited to gain access to a system.29 Jul 2009
-
Managing third-party compliance
In this podcast, special guest expert Richard Mackey offers tips on managing third-party compliance and risk.28 Jul 2009
-
Information Security Learning Guides
Information security learning guides cover topics such as firewalls, Snort, VoIP, Bluetooth security, intrusion prevention, spyware, web security, network access control and more.28 Jul 2009
-
Why doesn't the CISSP cover information assurance and DIACAP?
The CISSP is the standard when it comes to information security certifications, but why is it required for government security jobs when it doesn't cover information assurance and DIACAP? Security ...28 Jul 2009
-
How to implement virtual firewalls in a complex network infrastructure
If your enterprise has a complex network infrastructure, it might be necessary to implement virtual firewalls or multiple security contexts. Network security expert Mike Chapple explains the pros a...28 Jul 2009
-
Black Hat presenters to showcase smart grid security risks
The smart grid is expected to increase efficiencies and reduce power consumption, but some utility companies are rolling out smart grid devices that could be targeted by attackers.28 Jul 2009
-
IBM acquires Ounce Labs for source code analysis
Big Blue plans to add the source code security testing vendor to its Rational software business. Financial terms were not disclosed.28 Jul 2009
Security Management Strategies for the CIO