-
McAfee jumps into IAM with one-time password, cloud SSO products
McAfee introduces two new identity and access management (IAM) products.30 Apr 2013
-
Use the Android static analysis tool Dexter to safely deploy apps
Video: Keith Barker of CBT Nuggets demos Dexter, the Android static analysis tool that examines and securely deploys Android applications.30 Apr 2013
-
Quiz: Using SIEM technology to improve security management processes
In this five question quiz, test your knowledge of our Security School lesson on using SIEM technology to improve security management processes.29 Apr 2013
-
With SE Android, NSA looks toward more secure Android platform
Video: The NSA's Troy Lange discusses SE Android and how he hopes it will play a role in fostering improved Android platform security for enterprises.29 Apr 2013
-
Improving security management processes with SIEM
This Security School will explain the best means for an organization to effectively analyze SIM data, how to improve SIM collection, set reasonable goals for these tools and how to get the best dat...29 Apr 2013
-
Avoiding pitfalls in social media compliance, security
Expert Mike Chapple offers regulatory compliance advice regarding the management of enterprise social media accounts.26 Apr 2013
-
Incorporating compliance teams in the request for proposals process
Procurement personnel should know when to include the compliance team in the request for proposals process.26 Apr 2013
-
Security requirements for Foreign Corrupt Practices Act compliance
Expert Mike Chapple explains the Foreign Corrupt Practices Act and the security controls required for compliance.26 Apr 2013
-
HIPAA compliance training: How to prevent lost or stolen devices
Mike Chapple explains how enterprises can help lessen the impact of lost or stolen devices as part of HIPAA compliance training.26 Apr 2013
-
Prevent DDoS DNS amplification attacks by securing DNS resolvers
Expert Nick Lewis details how misconfigured DNS resolvers can be used for DDoS DNS attacks and how organizations can secure them.26 Apr 2013
-
ISACA World Congress -INSIGHTS 2013
Date: 10-12 June, 2013
Location: Berlin, German
26 Apr 2013 -
Over 100k serial devices online and unsecured, says HD Moore
Security researcher HD Moore says 114,000 serial devices exposed to the Internet are highly hackable.25 Apr 2013
-
Weighing compliance mandates vs. security vulnerability management
Should security vulnerabilities be prioritized based on compliance needs? Mike Chapple discusses this approach to vulnerability management.25 Apr 2013
-
Utilize the Blacksheep technique for rootkit detection, cleanup
Is the Blacksheep technique a legitimate enterprise option for rootkit detection and cleanup? Expert Nick Lewis discusses.25 Apr 2013
-
Opinion: DBIR, other computer security statistics paint tricky picture
Verizon's annual breach report highlights a spate of new security research reports. However, overall conclusions from these are hard to come by.24 Apr 2013
-
Enterprise information security employee retention strategies
Expert Ernie Hayden offers employee retention strategies. Learn how to keep good enterprise infosec staff for the long haul.24 Apr 2013
-
Mining for infosec talent: How CISOs can fill security positions
Expert Ernie Hayden advises CISOs on best practices for filling security positions within the enterprise when faced with a lack of talent.24 Apr 2013
-
Trusteer warns of new man-in-the-browser Twitter attack
The attack seeks to compromise a Twitter webpage via a man-in-the-browser attack. Trusteer warns it could be a harbinger of broader future attacks.24 Apr 2013
-
Does ISO 27001 certification mean HIPAA and HITECH compliance?
Mike Chapple clarifies the difference between ISO 27001 certification and HIPAA and HITECH compliance.24 Apr 2013
-
Software security podcast library
SearchSecurity.com is pleased to partner with Gary McGraw to feature his monthly Silver Bullet software security podcasts, which discuss best practices in software security.24 Apr 2013
Security Management Strategies for the CIO