-
Mobile device policy
In this Security School lesson, expert Lisa Phifer covers the technologies, policy items and processes your enterprise needs to be considering as mobile workforces ramp up and security and complian...29 Apr 2011
-
Assessing Internet Explorer 9 security: Safest browser ever?
Research shows Internet Explorer 9 security identifies as much as 99% of potential malware. So is IE9 now the safest browser out there? Michael Cobb answers that question in this expert tip.29 Apr 2011
-
Top 5 mobile data protection best practices
In this tip, we highlight five essential best practices for protecting business data stored on mobile devices and tablets, and identify readily available technologies that can be used to implement ...28 Apr 2011
-
Microsoft updates Malicious Software Removal Tool for Coreflood removal
The out-of-band update can detect botnet infections and continue to cripple the notorious Coreflood botnet.28 Apr 2011
-
Recent data breaches redefine failure, demand new approaches
Column: What do recent data breaches at RSA, WordPress and Sony have in common? Companies must not only find weaknesses, but also actively hunt down intruders.28 Apr 2011
-
Quiz: Mobile device policy: How to prevent data theft
How much do you know about mobile device policies and preventing data theft? Take this short quiz to determine what you've learned from our Security School on mobile device security policies with L...27 Apr 2011
-
Survey finds users re-evaluating two-factor authentication options
In the wake of the RSA SecurID breach, a vendor survey finds a reduced level of confidence in the security provided by tokens.27 Apr 2011
-
Exploring SIM architecture options for virtual data center security
To be successful in securing the virtual data center, security information management (SIM), a key element for effective data center security, must virtualize and become virtualization-aware. In th...27 Apr 2011
-
Software remediation can get caught in organizational issues
Running an application security program requires more than a solid budget. It needs a person with deep knowledge of the organization and its engineering processes.26 Apr 2011
-
Defining enterprise security best practices for self-provisioned technology
Is your current enterprise security policy ready for mobile and cloud computing technology? Probably not, but it can be: Forrester's Chenxi Wang explains how.26 Apr 2011
-
Adobe issues fix for Acrobat, Reader to block ongoing Flash attacks
Adobe is fixing a serious vulnerability affecting its Reader and Acrobat products. The update affects current versions of Adobe Reader and Acrobat X for Windows.22 Apr 2011
-
Marcus Ranum on the consequences of poor software design
Marcus Ranum discusses the consequences of poor software design and what can be done to ensure this does not happen in the future.22 Apr 2011
-
Defense in Depth 2.0
This video will offer an executive overview of not only the key business and technical issues that have necessitated a dramatic change in defense in depth design, but also how to develop a strategy...22 Apr 2011
-
UTM features: Is a UTM device right for your layered defense?
Expert Mike Chapple explores what features a contemporary UTM device provides, and explains the factors that help determine UTM total cost of ownership.22 Apr 2011
-
Quiz: Reinventing defense in depth
This quiz is part of SearchSecurity.com’s Intrusion Defense Security School lesson, Reinventing defense in depth. Reinforce your knowledge of the key concepts of this lesson by taking the five-ques...22 Apr 2011
-
Jim Lewis on SCADA security threats, Stuxnet analysis
Jim Lewis, Director and Senior Fellow at the Center for Strategic and International Studies, gives his analysis of the Stuxnet worm, and what he believes are the greatest threats to SCADA systems.21 Apr 2011
-
Jim Lewis on cyberwarfare, secure infrastructure collaboration
In this video, the director of the Center for Strategic and International Studies discusses cyberwar and the need for collaborative infrastucture protection.21 Apr 2011
-
Eye On: Secure Software Development
This special report explores software security: reducing vulnerabilities and improving development processes.21 Apr 2011
-
Security pros find software code security improvements, weigh next step
Secure coding practices are improving at many software vendors, fueled by an increased emphasis on secure coding frameworks, training and new processes.21 Apr 2011
-
Software code analysis firm gives security vendors poor marks
The latest study of application code by Veracode found many applications submitted by software makers are of “unacceptable security quality.”20 Apr 2011
Security Management Strategies for the CIO