-
HP printer vulnerabilities leave millions of printers susceptible to attack
Researchers at Columbia University have discovered a vulnerability in HP’s LaserJet printers that could allow attackers to gain complete remote control.30 Nov 2011
-
Antivirus engines: Lessons learned from the Tavis Ormandy Sophos research
Learn how the discovery of several flaws in the Sophos antivirus engine can help advance the state of antimalware software.30 Nov 2011
-
HTML 5 security issues pose challenges for enterprises, experts say
While the Adobe Flash replacement packages browser data more efficiently, HTML 5 security issues present holes that could be targeted by attackers.30 Nov 2011
-
The ongoing debate over a federal breach notification law
Lawmakers continue to wrangle over creation of a national data breach notification standard.29 Nov 2011
-
Good information security leaders must be good security recruiters
If you’re going to lure topnotch talent, refine your skills.29 Nov 2011
-
SEC guidance clarifies cybersecurity disclosure requirements
Companies need to factor security risks and incidents in their financial disclosures, agency says.29 Nov 2011
-
The need for cloud computing security standards
Cloud computing needs security standards and widely adopted security practices in order to become a viable choice for the enterprise.29 Nov 2011
-
Alternatives to passwords: Replacing the ubiquitous authenticator
As the relative security of passwords falters, are they destined for obscurity?29 Nov 2011
-
Enterprise digital rights management best practices
EDRM brings users into security more than any other tool. Are you ready?29 Nov 2011
-
Chris Paget on Vista final software security review
Researcher tells a firsthand account of her experience as a member of the final security review team for Windows Vista.29 Nov 2011
-
New Facebook worm poses as a screensaver
Like previous Facebook worms, the new malware uses stolen credentials to log into accounts and spam contacts.29 Nov 2011
-
How to bolster BIOS security to prevent BIOS attacks
BIOS attacks can be thwarted by implementing NIST guidelines for BIOS security.29 Nov 2011
-
Twitter acquires WhisperSystems mobile security technology
Twitter acquired WhisperSystems, a firm that makes mobile encryption and firewall technology for Android devices.28 Nov 2011
-
Securing IE with plug-ins Google Chrome Frame and IETab
Web browser plug-ins can bolster IE security for legacy apps that have to run on outdated versions of Internet Explorer.28 Nov 2011
-
Windows MBSA scan demo: Conducting a Windows security review
In this screencast, Mike McLaughlin shows how a Windows MBSA scan can help determine client and server patch status during a Windows security review.28 Nov 2011
-
Assessing Google Chrome extension flaws and Chromebook security
Learn how flaws in the Google Chrome extensions affect the Chromebook security and the role they play in a risk assessment.25 Nov 2011
-
Learning from the MySQL.com hack: How to stop website redirects
Learn how to stop website redirects put in place by malicious hackers, and how to prevent attacks like the MySQL.com hack.23 Nov 2011
-
Mobile device management market offers mobile device security options
The mobile device management market offers options for mobile device security challenges, but there's no clear consensus on how to choose a product.23 Nov 2011
-
Detecting covert channels to prevent enterprise data exfiltration
A covert channel is just one more way data can leave the network. Learn how to detect and block covert channels from threats expert Nick Lewis.22 Nov 2011
-
NoScript addon: A valuable addition to your antimalware toolkit
Browser plug-ins like the NoScript add-on can help prevent malware infections when configured correctly. Expert Nick Lewis explains.21 Nov 2011
Security Management Strategies for the CIO