-
application blacklisting
Application blacklisting, sometimes just referred to as blacklisting, is a network administration practice used to prevent the execution of undesirable programs. Such programs include not only tho...30 Jun 2011
-
Information security market consolidation: A mixed bag
Big tech companies are scooping up security vendors with mixed results.30 Jun 2011
-
Does information security market consolidation mean the end of the line?
Large IT companies are buying up security vendors, but that doesn’t mean there won’t be plenty of room for innovative startups.30 Jun 2011
-
The threat landscape and Web 2.0 technologies
The idea that social media and other Web 2.0 technologies have vastly altered the threat landscape is plain wrong.30 Jun 2011
-
Turn your computer incident response team into counter-threat operations
Fending off modern computer attacks requires actively hunting down intruders.30 Jun 2011
-
Striving for better information security intelligence
Security teams strive to gain visibility from a deluge of security information and put that data to work.30 Jun 2011
-
PCI virtualization SIG analysis: Guidance for the cardholder data environment
The PCI virtualization SIG guidance is in. Get analysis and advice on virtualization in the cardholder data environment from expert Diana Kelley.30 Jun 2011
-
Your information security career and the job market: Value of information security skills
Be aware of changing technology and industry trends, and your job prospects will fall in line.30 Jun 2011
-
PCI virtualization guidance warns of compliance challenges
PCI group outlines challenges in achieving compliance with payment data on virtualized systems.30 Jun 2011
-
Enterprise mobile security risks prompt revised mobile protection strategy
Cybercriminals will find ways to bypass native security restrictions on smartphones and other devices, says security luminary Winn Schwartau.28 Jun 2011
-
Improve mobile malware protection, lower data loss risks by locking down devices
Mobile malware has been minimal, but attackers are developing attacks that target smartphones to gain access to sensitive data, says security luminary Winn Schwartau.28 Jun 2011
-
High-profile attacks, inadequate defenses burden IT security programs
Can CISOs turnaround IT security programs to be more proactive? Experts say many programs are frozen in a reactive mode.27 Jun 2011
-
IE9 security, Apple security issues: Video with Gartner’s Neil MacDonald
In this video, Gartner’s Neil MacDonald discusses patch management, IE9 security, his Windows 8 security wish list and protecting Apple computers.24 Jun 2011
-
RSA SecurID attack, social engineering threat analysis from Gartner's Neil MacDonald
In this video, Gartner Vice President Neil MacDonald discusses the SecurID attack at RSA, APT realities and the growing enterprise social engineering threat.24 Jun 2011
-
WebScarab tutorial: Demonstration of WebScarab proxy functionalities
In this WebScarab tutorial video, get step-by-step advice on how to install and use this free tool, including the WebScarab proxy features, among others.23 Jun 2011
-
Ramon Krikken on tokenization vs. encryption, PCI tokenization
The Gartner IT1 research director discusses tokenization vs. encryption, PCI tokenization to reduce audit scope and lagging tokenization standards.23 Jun 2011
-
Gartner Security Summit attendees on IT security, government issues
When managing IT security, government infosec pros face unique risks. Check out these Q&As from the 2011 Gartner Security & Risk Management Summit.23 Jun 2011
-
Gartner’s Ramon Krikken on Web application security scanners
In this video, learn how to get the most out of Web application security scanners, and the four key elements for a successful implementation.23 Jun 2011
-
Eye On: CISO Management Issues
SearchSecurity.com's "Eye On" series examines a security topic each month. In June, the series explores cloud contracts, compliance demands, security awareness and risk-based decision making.23 Jun 2011
-
Top five themes from Gartner Security Summit 2011
Eric B. Parizo discusses the top themes from the 2011 Gartner Security & Risk Management Summit, including the rediscovery of enterprise risk management.23 Jun 2011
Security Management Strategies for the CIO