-
memory-scraping malware
Memory-scraping malware is a type of malware that helps hackers to find personal data. It examines memory to search for sensitive data that is not available through other processes.30 Apr 2012
-
differential power analysis (DPA)
A differential power analysis (DPA) attack is an exploit based on analysing the correlation between the electricity usage of a chip in a smart card and the encryption key it contains.30 Apr 2012
-
HTML5 security: Will HTML5 replace Flash and increase Web security?
Will HTML5 replace Flash? Expert Michael Cobb discusses whether HTML5 security is better than Flash, and why HTML5 traffic can be harder to secure.30 Apr 2012
-
UTM devices: Efficient security or a firewall failure risk?
UTM devices provide more protection than a simple firewall, but do they increase the risk of an enterprise firewall failure?30 Apr 2012
-
IE automatic updates: Better security or more update fatigue?
Expert Michael Cobb deciphers the reasons behind Microsoft's new IE automatic updates. Will they combat update fatigue, or risk breaking Web apps?29 Apr 2012
-
Web browser security comparison: Are Firefox security issues legit?
Expert Mike Cobb reacts to a Google-funded Web browser security comparison and whether it highlights legitimate enterprise Firefox security issues.29 Apr 2012
-
Reverse engineering tools for mobile apps emerging, expert says
Reverse engineering mobile apps help pen testers find weaknesses and hidden malware, but the various mobile platforms and different versions make automation difficult, according to one expert.27 Apr 2012
-
Beyond Antimalware
The threat landscape is more sophisticated than ever with more attack techniques, tactics and vectors available. Given the dynamic threat and IT environments today, traditional antimalware methods ...27 Apr 2012
-
Exclusive Special Report For Symantec Vision 2012 Attendees
Exclusive Special Report For Symantec Vision 2012 Attendees from SearchStorage.com and SearchSecurity.com27 Apr 2012
-
CISPA threat intelligence bill passes House
The Cyber Intelligence Sharing and Protection Act (CISPA), clears security vendors of any liability for sharing customer attack data with federal officials.27 Apr 2012
-
typeprint analysis
Typeprint analysis is a technology in which the rhythmic patterns of a person's keyboard behavior, known as keystroke dynamics, are analyzed over a period of time and then stored... (Continue)26 Apr 2012
-
role-based access control (RBAC)
Role-based access control (RBAC) is a method of regulating access to computer or network resources based on the roles of individual users within an enterprise...26 Apr 2012
-
Mobile device management systems help mitigate BYOD risks
Understand the benefits and limitations of multi-platform MDM technology.26 Apr 2012
-
VMware strategy for security partners undergoes overhaul
Virtualization giant revamps its security partner program after hitting some bumps in the road.26 Apr 2012
-
Deploying DP systems: Four DLP best practices for success
Plan your data loss prevention project carefully to avoid missteps.26 Apr 2012
-
Thwarting BYOD risks starts with a mobile security policy, experts say
Organizations need to establish formal mobile policies before buying a mobile device management system.26 Apr 2012
-
Verizon DBIR: Organizations are forgetting computer security basics
Verizon data breach report illustrates need to get back to basics.26 Apr 2012
-
Cybersecurity education vs. cybersecurity training
Security professionals need to understand the difference and plan accordingly.26 Apr 2012
-
Security staffing: Why information security positions go unfilled
Be aware of potential roadblocks and adjust your recruiting accordingly.26 Apr 2012
-
For data security, cloud customers need DIY approach
To ensure data security, cloud computing customers must accept a do-it-yourself approach, rather than relying on providers for security.26 Apr 2012
Security Management Strategies for the CIO