-
Mobile device security now an imperative
Consumerization is transforming how enterprises secure mobile devices. Zeus Kerravala, Principal Analyst at ZK Research, surveys the threat landscape.30 Nov 2012
-
Study finds spear phishing at heart of most targeted attacks
Malicious file attachments are typically used as the payload, according to a report issued this week by Trend Micro.29 Nov 2012
-
Unrealistic expectations, skills gap mire market for IT security jobs
Unrealistic HR and hiring manager expectations and a widening security skills gap is challenging CISOs trying to find the right security talent.27 Nov 2012
-
US-CERT warns of new Samsung, Dell printer threat
Hard-coded passwords on some Samsung and Dell printers could enable an attacker to take control of an affected device.27 Nov 2012
-
Study finds most antivirus products ineffective
Slow updates to signature databases cause some antivirus products to be ineffective against known threats, according to a study by security firm Imperva.27 Nov 2012
-
Critical infrastructure protection hindered by difficulties, experts say
Information Security magazine discussed critical infrastructure protection with three experts and explore whether any near-term solutions can be implemented to bolster network defenses.27 Nov 2012
-
Private market growing for zero-day exploits and vulnerabilities
Exploitable vulnerabilities are becoming harder to find in popular software, but information on such flaws is increasingly valuable, and many security researchers are no longer willing to give it u...27 Nov 2012
-
Marcus Ranum chat: Network threat detection and wireless attacks
Security expert and Information Security magazine columnist goes one-on-one with Aaron Turner, co-founder of security consulting firm N4Struct.27 Nov 2012
-
Firm pushes software security testing with fugitive tracking system
System that helps law enforcement track down fugitives was tested thoroughly to prove to CTOs and IT teams that the company is serious about security.27 Nov 2012
-
Chief information security officer skills go beyond customary technical roles
A trusted advisor and a strong communicator and promoter, a good CISO should be a jack-of-all-trades to rally the IT security team to support the business needs by minimizing risk.27 Nov 2012
-
Emerging vulnerability markets, mobile biometrics prompt security concerns
Information Security Magazine examines key security concerns in the field of critical infrastructure protection and explores options for mobile biometric authentication because you’ll need to think...27 Nov 2012
-
Does the iOS Security Guide reveal any Apple iOS security issues?
Expert Michael Cobb digs into the Apple iOS Security Guide to see if any iOS security issues are revealed.27 Nov 2012
-
Petraeus scandal holds lessons in email security policy, e-discovery
Mixing business and personal email accounts has serious drawbacks, as well as consequences on IT teams managing data integrity.26 Nov 2012
-
Go Daddy responding to malicious DNS entries
Weak passwords may be enabling attackers to hack the DNS records of some Go Daddy hosted websites to spread ransomware.26 Nov 2012
-
How enterprises should address the latest Skype security concerns
A Web-based tool has exposed some serious Skype security concerns. Expert Michael Cobb discusses the options for organizations that rely on Skype.26 Nov 2012
-
Zenmap tutorial: Mapping networks using Zenmap profiles
Video: In this Zenmap tutorial screencast, Keith Barker of CBT Nuggets explains how to efficiently map networks graphically using Zenmap profiles.26 Nov 2012
-
Download: Log management best practices: Six tips for success
In this expert e-guide from SearchSecurity.com you'll discover Six tips for success in Log management22 Nov 2012
-
Phishing attack, stolen credentials sparked South Carolina breach
A phishing attack and stolen credentials gave an attacker access to the systems of the South Carolina Department of Revenue for two months.21 Nov 2012
-
Quiz: Choosing a Web security gateway
Check you're up to speed and ready to choose and deploy a Web security gateway. This five-question quiz will test you on the key points we've covered in the webcast, podcast and article in this Sec...21 Nov 2012
-
How to address gTLD security as ICANN accepts more applications
Expert Michael Cobb provides advice on addressing gTLD security as ICANN accepts more and more domain extension applications.21 Nov 2012
Security Management Strategies for the CIO