-
Oracle issues Java security update fixing dangerous zero-day vulnerabilities
The latest update fixes widely exploited zero-day vulnerabilities. Metasploit manager praises company for fast turnaround.30 Aug 2012
-
Antivirus alternatives: Evolving enterprise endpoint security strategy
Do any viable antivirus alternatives exist? Security expert Matt Pascucci offers an endpoint security strategy that looks beyond AV to fight malware.30 Aug 2012
-
Ezine Download: Information Security magazine
Download Information Security magazine July/August 2012 issue today.30 Aug 2012
-
Ezine Download: Information Security Magazine June 2012
Download the June issue of Information Security magazine today.30 Aug 2012
-
Ezine Download: Information Security Magazine May 2012
Download Information Security magazine May 2012 today.30 Aug 2012
-
Ezine Download: Information Security Magazine April 2012
Download Information Security Magazine's April 2012 issue today.30 Aug 2012
-
Java sandboxing could thwart attacks, but design may be impossible
Basic Java sandboxing has been around since 1995, but flaws in the Java virtual machine are highly targeted. Experts are calling on Oracle to do more.29 Aug 2012
-
Verizon DBIR 2012: On Web app security, basics still lacking
Expert Michael Cobb analyzes takeaways from the Verizon DBIR 2012 report regarding Web app security and the need for more basic security measures.28 Aug 2012
-
The SSL handshake process: Public and privates keys explained
Expert Michael Cobb details the SSL handshake and the role of public and private keys in a C2B transaction.28 Aug 2012
-
What are the costs and benefits of Good Mobile Access for Android?
Expert Michael Cobb details the costs and benefits of Android GMA, which raises the bar for mobile browser security.28 Aug 2012
-
Attack code surfaces targeting Java zero-day flaw
The Java zero-day flaw affects users of Mozilla, Internet Explorer and Safari.28 Aug 2012
-
The security benefits of silent updates: Timing is everything
In light of the increasing popularity of silent updates, expert Michael Cobb examines their security and application-compatibility implications.27 Aug 2012
-
How to secure Android devices: Advice for good Android lock patterns
Get advice from expert Michael Cobb on how to secure your Android device with good Android lock patterns.24 Aug 2012
-
Information security controls for data exfiltration prevention
Enterprises may be amazed to discover how valuable their data is to attackers. Learn five information security controls to prevent data exfiltration.24 Aug 2012
-
PCI SSC's Bob Russo on point-to-point encryption, PCI compliance
Video: The PCI SSC GM discusses tokenization, point-to-point encryption, PCI compliance and plans to approve vendor P2P encryption products.24 Aug 2012
-
Emergency Adobe update APSB12-19 addresses more Flash Player flaws
Adobe has released updates for six critical vulnerabilities, following a patch just one week ago that addressed other critical flaws.22 Aug 2012
-
Bob Russo on mobile payment security and PCI compliance
Video: The PCI SSC is working on guidance for businesses that want to accept mobile payments and are testing mobile payment applications for PCI compliance.22 Aug 2012
-
Disttrack discovery highlights growing use of targeted malware
W32.Disttrack, a worm that corrupts files and overwrites the MBR, further proves attackers now favor targeted malware for penetrating enterprises.21 Aug 2012
-
Sharing security intelligence: How to build a strong network
Expert Nick Lewis explains how enterprises can forge strong security networks that support sharing security intelligence.21 Aug 2012
-
Picking the best enterprise antivirus product: Does AV research count?
Is your enterprise conducting an anti-malware comparison? Expert Nick Lewis provides metrics to find the best fit for your enterprise's needs.21 Aug 2012
Security Management Strategies for the CIO