-
Year’s top 5 security podcasts highlight security breaches of 2011
Among the experts are Verizon’s Wade Baker on data breaches, Microsoft’s David Ladd on software security and Catalin Cosoi of BitDefender on targeted attack prevention.30 Dec 2011
-
Multifunctional malware, staged drive-by attacks to rise in 2012
Malware toolkits are being programmed with attacks that make the most business sense, say security experts. Automated toolkit users will have new capabilities to target specific groups and organiza...30 Dec 2011
-
Microsoft emergency update to address hash collision attacks
A critical update affects all versions of Microsoft .NET Framework and other programming languages. The vulnerability could allow denial-of-service attacks.29 Dec 2011
-
Cybersecurity career experts: Mobile app security skills hot in 2012
The increase in smartphones and other mobile devices has fueled demand for IT security pros with mobile app security and networking skills, say several cybersecurity career experts.28 Dec 2011
-
Security intelligence firm Stratfor investigates hacktivist attack
A hacktivist group claims it stole credit card data from organizations that purchased the intelligence firm’s publications.27 Dec 2011
-
VoIP eavesdropping: Hardening network security to contain VoIP risks
Mike Chapple analyzes the VoIP risks posed by implementing a VoIP network and exposes the reality of telephone eavesdropping.27 Dec 2011
-
Exchange Server administration policy: Managing privileged user access
Randall Gamby explains the important particulars involved with setting up and securely supervising an enterprise Exchange Server administration policy.22 Dec 2011
-
Spear phishing attacks likely key in U.S. Chamber of Commerce breach, experts say
Spear phishing attacks via China were likely what led to the lengthy U.S. Chamber of Commerce breach, experts say.21 Dec 2011
-
Privileged account policy: Securely managing privileged accounts
Randall Gamby discusses how to securely implement a privileged account policy within the enterprise and collectively manage sensitive account information.21 Dec 2011
-
Privileged user access management: How to avoid access creep
One of the most difficult areas of privileged user access management is avoiding access creep. John Burke covers how to keep privileged users in check.21 Dec 2011
-
Information security podcasts: 2010 and 2011 archive
Download information security podcasts from SearchSecurity's 2010 and 2011 podcast archive.20 Dec 2011
-
Credential validation for an enterprise password storage vault
Randall Gamby offers advice on the credential validation process for an enterprise password storage system.20 Dec 2011
-
Critical Windows 7 zero-day vulnerability could lead to iFrame attacks
Danish vulnerability clearinghouse Secunia is warning of a highly critical memory corruption zero-day vulnerability that could be targeted by attackers. Proof-of-concept code has been published.20 Dec 2011
-
Why businesses should care about proposed Protect IP, SOPA pirating laws
Legislation is aimed at stopping piracy, but security professionals and industry groups say it could weaken security, hamper innovation and limit competition among small businesses and startups.20 Dec 2011
-
EDRM-DLP combination could soon bolster document security management
The integration of enterprise digital rights management solutions and data loss prevention tools could bring a level of automation to document security management.20 Dec 2011
-
An intro to free Microsoft security tools for secure software development
Free Microsoft security tools Threat Modeling, MiniFuzz and RegExFuzz are designed to help developers build secure software.19 Dec 2011
-
Enabling secure Web development means treating vulnerabilities as bugs
Gil Danieli explains why secure Web development depends on treating vulnerabilities like any other software bugs, and how to get Web developers to buy in.19 Dec 2011
-
How penetration testing helps ensure a secure data store
A third-party penetration test is the best way to determine whether an online data store can be compromised.16 Dec 2011
-
How EDRM can bolster enterprise content management security
Learn about implementing enterprise EDRM and how this technology combo supports enterprise content management security.16 Dec 2011
-
GlobalSign hack update: Certificate authority finds no rogue certs
Following a breach to a GlobalSign Web server, an extensive investigation found no evidence of an infiltration of its digital certificate infrastructure and no leakage of its certificate keys.15 Dec 2011
Security Management Strategies for the CIO