-
Likely Visa, MasterCard security breach linked to third-party processor
The credit card giants tell banks that a third-party payment processor may have been breached, causing the loss of tens of thousands of card numbers.30 Mar 2012
-
Secure remote access? Security-related remote access problems abound
Is there really such a thing as secure remote access? Editor Eric B. Parizo says there are too many security-related remote access problems to ignore.30 Mar 2012
-
Verizon DBIR 2012 overview, attack mitigation strategies
Christopher Porter of Verizon explains some of the findings from the Verizon 2012 Data Breach Investigations Report. This year, hacktivists had a big impact on the numbers.30 Mar 2012
-
Unified threat management devices for the enterprise
UTMs aren’t just for SMBs anymore. Here are four requirements for enterprise-grade UTM.29 Mar 2012
-
Understanding tokenization: What is tokenization and when to use it
Tokenization protects sensitive data to reduce the compliance burden.29 Mar 2012
-
AMI networks: PKI security considerations
PKI components in smart grid and AMI infrastructure introduce new hazards.29 Mar 2012
-
Web browser security features make attacks harder
Accuvant analysis and hacking contests illustrate browser security improvements.29 Mar 2012
-
Don’t turn security Big Data analysis into a forgettable cliché
It’s easy to be cynical about the latest security buzzword, but don’t be so quick to dismiss it.29 Mar 2012
-
Marcus Ranum chat: Security startups and security innovation
Security expert Marcus Ranum talks with Peter Kuper, a partner with In-Q-Tel focused on funding compelling startups to accelerate innovation for the intelligence community.29 Mar 2012
-
Information security roles and technology shifts
New technologies and business models are rapidly changing the role of the security pro.29 Mar 2012
-
Adobe Flash Player patch fixes critical holes, releases silent automatic updater
Adobe released a bulletin addressing critical flaws in Flash Player and rolled out a silent automatic update feature in Flash 11.229 Mar 2012
-
Future of SIEM market hinges on past mistakes
The SIEM market had a rocky start, but recent technology advancements have made SIEM products easier and more reliable.29 Mar 2012
-
Information security career paths leading to security specialist jobs
Recruiter Peter Rendall sees information security career paths leading toward security specialist jobs; SIEM, DLP and analysis are especially hot.28 Mar 2012
-
Web browser attacks aimed at plug-ins despite rise in flaws, IBM finds
An IBM report found a slight increase in browser-based vulnerabilities, but security features are driving attackers to target components rather than the browser itself.28 Mar 2012
-
Verizon sheds some light on cloud breaches
Verizon says cloud breaches are more about giving up control of assets rather than technology vulnerabilities.28 Mar 2012
-
Facebook attacks illustrate need for education
Stolen Facebook account credentials could potentially give attackers access to the victim’s corporate network.27 Mar 2012
-
Screencast: How to use GHDB to identify security holes, Googledorks
In this screencast, Mike McLaughlin uses the Google Hacking Database (GHDB) to identify Googledorks and other security vulnerabilities.26 Mar 2012
-
Katie Moussouris of Microsoft on vulnerability disclosure, ISO standard
Katie Moussouris discusses coordinated vulnerability disclosure, the Microsoft Blue Hat Prize and developing an ISO vulnerability disclosure standard.26 Mar 2012
-
ISP’s anti-botnet code of conduct accomplishes little
Leading ISPs sign the U.S. Anti-Bot Code of Conduct, which stops short of demanding ISPs provide a clean pipe to customers.26 Mar 2012
-
Use Telnet alternative SSH to thwart Telnet security risks
The inherently insecure Telnet protocol shouldn’t be used on modern networks. Learn why and what to use in its place.23 Mar 2012
Security Management Strategies for the CIO