-
Project Mayhem hack details enterprise accounting system flaws
Proof-of-concept code targets Microsoft Dynamics Great Plains platform and can enable an attacker to transfer funds to accounts of their choosing.27 Dec 2012
-
Stolen credentials, basic security lapses at core of 2012 breaches
Social engineering attacks and stolen passwords are giving attackers unfettered access to corporate systems for extended periods of time.26 Dec 2012
-
Unwrapping a new smartphone? Experts deliver device security tips
A new smartphone or tablet under the Christmas tree should be giftwrapped with a list of security and privacy guidelines, experts say.24 Dec 2012
-
What is 'big data'? Understanding big data security issues
In this Ask the Expert video, Ernie Hayden answers the question of what 'big data' is and outlines big data security issues in this video.21 Dec 2012
-
How should NFC security risks affect a BYOD security policy?
Security expert Nick Lewis explores the emerging security risks posed by NFC technology and discusses their effect on enterprise BYOD policy.21 Dec 2012
-
IT security job market is hot but tricky, expert says
The IT security skills required by some firms have become a lot more specific. The demand for security generalists is waning.20 Dec 2012
-
Quiz: CISSP practice exam questions and answers
Test your knowledge and preparedness for the CISSP exam with ten questions taken directly from Shon Harris' best-selling 'CISSP Practice Exams' book.20 Dec 2012
-
IT Salary Survey 2012: IT security, compliance pros anticipate raise in 2013
Security and compliance pros taking TechTarget's 2012 IT Salary Survey aren't complacent, indicating openness to new jobs, eagerness for a promotion.20 Dec 2012
-
Why a security conscience is key among CISO responsibilities
Every firm needs a security conscience, according to expert Ernie Hayden, who says it is critical among key CISO responsibilities.20 Dec 2012
-
Cleaning a compromised server: How to detect booter shells, remnants
Expert Nick Lewis discusses the importance of fully cleaning a compromised server and how to detect and remove booter shells and other remnants.20 Dec 2012
-
Dell acquires Credant Technologies for device encryption
Dell said the addition of Credant bolsters its data protection strategy by adding encryption capabilities for laptops and mobile devices.19 Dec 2012
-
Avoiding the invisible: How to defend against iFrame attacks
How can enterprises and users protect themselves from malicious content embedded in iFrames? Expert Nick Lewis explores iFrame attack mitigations.19 Dec 2012
-
US-CERT warns of Adobe Shockwave Player threat
An attacker can exploit weaknesses in files intended to extend the functionality of Shockwave Player. No practical solution is available, US-CERT said.18 Dec 2012
-
Overview: New PCI mobile application development guidelines
The PCI SSC recently released mobile application development security guidelines. Mike Chapple outlines the document and highlights key takeaways.18 Dec 2012
-
How to protect users exposed to cache poisoning attacks by HTML5
Expert Nick Lewis explains how the HTML5 offline application cache exposes users to the threat of cache poisoning and provides mitigation options.18 Dec 2012
-
A new targeted Trojan, Batchwiper, wipes data from drives
Symantec has confirmed the existence of the targeted Trojan it calls Batchwiper.17 Dec 2012
-
Blue Coat to acquire UTM networking firm Crossbeam
Blue Coat said Crossbeam gives it a platform for its software and also helps bolster its network optimization strategy in high-end data centers.17 Dec 2012
-
How to avoid security issues with VPN leaks on dual-stack networks
The ongoing transition to IPv6 has revealed security issues with VPN leaks on dual-stack networks. Fernando Gont explains and offers mitigations.17 Dec 2012
-
CISSP Practice Test
CISSP Practice Test17 Dec 2012
-
Conducting APT detection when Elirks, other backdoors hide traffic
Is it possible to detect APT attacks when malicious traffic is hidden? Expert Nick Lewis details how the Elirks backdoor connection hides APT traffic.17 Dec 2012
Security Management Strategies for the CIO