-
NetWitness' CSO on targeted malware, Spectrum malware analysis tool
Eddie Schwartz, CSO of network analysis firm NetWitness, talks about targeted malware in the wake of Stuxnet and the company's new Spectrum malware analysis platform.31 Jan 2011
-
Understanding the value of an enterprise application-aware firewall
Today's enterprise application-aware firewall technology offers a host of features to manage application and Web 2.0 traffic. Expert Michael Cobb takes a look at the features and how to make the mo...31 Jan 2011
-
Cost of non-compliance outweighs cost of maintaining compliance, report finds
A study by the Ponemon Institute found that the average total cost of compliance is more than $3.5 million.31 Jan 2011
-
RSA 2011 preview: Compliance
In this RSA Conference 2011 preview video, SearchSecurity.com News Director Robert Westervelt moderates a discussion on a wide variety of compliance issues. Speakers include SearchSecurity.com Seni...31 Jan 2011
-
RSA Conference 2011 preview: Trends and tips
In this RSA Conference 2011 preview, SearchSecurity.com News Director Rob Westervelt and Senior Site Editor Eric Parizo discuss possible tips and trends with Joshua Corman, research director of ent...31 Jan 2011
-
content filtering (information filtering)
On the Internet, content filtering (also known as information filtering) is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable.28 Jan 2011
-
Attack code surfaces for new Windows MHTML zero-day vulnerability
Proof-of-concept code has surfaced enabling attackers to target the vulnerability. All versions of Windows are vulnerable.28 Jan 2011
-
Quiz: Building a compliance scorecard
How much have you learned about building a compliance scorecard? Find out with this short quiz.28 Jan 2011
-
Ignoring mobile hype? Don't overlook growing mobile device threats
It may seem like more mobile hype, but Senior Site Editor Eric B. Parizo writes that there are legitimate reasons why mobile device threats may be on the rise.27 Jan 2011
-
Malicious hosting provider taken down crippling botnet networks
The upstream provider serving hosting provider Volgahost shut down uploads from its servers, effectively cutting off botnet command and control servers from giving any orders.27 Jan 2011
-
Creating a compliance culture to boost infosec compliance and risk management
Creating a culture of compliance takes time, but expert Eric Holmquist offers five time-tested tactics to help break down cultural barriers to improve information security risk and compliance manag...27 Jan 2011
-
Career networking strategies: Alternatives to infosec certification
Certification isn't the only -- and may not even be the best -- way to set yourself apart in the eyes of potential employers. Learn networking strategies to get your name in front of the right people.27 Jan 2011
-
TippingPoint Zero-Day Initiative fixes record number of vulnerabilities
The TippingPoint Zero-Day Initiative (ZDI) program fixed 300 vulnerabilities in 2010, triple the number of flaws repaired in 2009.27 Jan 2011
-
Cybercriminals offer new sales tactics for stolen data
Cybercriminals are resorting to new sales tactics to remain viable in an increasingly competitive environment, according to a new report.25 Jan 2011
-
About Us
About Us25 Jan 2011
-
Data sanitization policy: How to ensure thorough data scrubbing
Could you be inadvertently leaking sensitive data via poorly sanitized devices? Learn techniques for thorough data scrubbing in this tip.25 Jan 2011
-
Business partners
Business partners25 Jan 2011
-
Mozilla proposes Firefox Do Not Track feature to boost browser privacy
The proposal, which transmits a special HTTP header to websites, may be supported in future versions of Firefox, but in order for it to fully work, websites must also support the feature.24 Jan 2011
-
P0f: A free collection of passive OS fingerprinting tools
In this screencast, learn how to use p0f, a collection of free passive OS fingerprinting tools.24 Jan 2011
-
Terms of Use
Copyright page for searchSecurity site24 Jan 2011
Security Management Strategies for the CIO