-
Unmanaged endpoints? Rethink the defense-in-depth security model
Today's endpoint security model is failing. What's next? Learn why endpoint defense-in-depth controls must assume the endpoint is compromised.28 Jun 2013
-
Security Wire Daily news RSS feed is moving!
As of July 1, the Security Wire Daily news RSS feed will be moving off of the Pheedo platform. Instead, please bookmark the following URL to make sure you continue to receive our content: http://se...27 Jun 2013
-
How to manage the deluge of information security threat reports
Many vendors and analysts publish information security threat reports. See Joseph Granneman's strategy to find and use the information that matters.26 Jun 2013
-
Application security risks posed by open source Java frameworks
Expert Michael Cobb says security issues with open source Java applications have more to do with misconfigurations than the frameworks themselves.25 Jun 2013
-
How to reduce the risk of Flash security issues
A rash of zero-day exploits has one organization looking for ways to reduce the risk posed by Flash running on endpoints.24 Jun 2013
-
Is Firefox PDF reader a secure alternative to Adobe Reader?
Expert Michael Cobb examines Mozilla’s Firefox PDF reader and discusses whether it is more secure than Adobe Reader.24 Jun 2013
-
What is OCSP? Understanding the Online Certificate Status Protocol
Expert Michael Cobb explains the CASC's Online Certificate Status Protocol (OCSP) and OCSP stapling.24 Jun 2013
-
Next-generation firewalls: Top five myths and misconceptions about firewalls
In this podcast, Joel Snyder dispels the top five myths, misconceptions and lies about firewalls.24 Jun 2013
-
Evaluating next-generation firewalls
In this presentation, Joel Snyder discusses best practices for evaluating next-generation firewalls.24 Jun 2013
-
How to use ThreadFix to simplify the vulnerability management process
Video: Keith Barker of CBT Nuggets demonstrates how Denim Group's ThreadFix helps simplify the enterprise vulnerability management process.24 Jun 2013
-
BB10 security: The risks of running Android apps on BlackBerry 10
Expert Michael Cobb explains the implications of running Android apps on BB10 and the system's new security features, including Balance.21 Jun 2013
-
Closing the gap between IT security risk management and business risk
Video: It's a mistake to equate IT security risk and business risk. VerSprite's Tony UcedaVelez explains why, and offers advice on bridging the chasm.21 Jun 2013
-
No firewall? How disabling the firewall can improve network security
Having no perimeter firewall may seem ludicrous, but Joel Snyder explains why disabling the firewall can actually improve enterprise network security.20 Jun 2013
-
Next-generation firewalls: Quiz on must-have NGFW features
Test your knowledge of Joel Snyder's course on evaluating, deploying and managing next-generation firewalls in this five-question quiz.20 Jun 2013
-
Understanding logic bomb attacks: Examples and countermeasures
In light of the attacks on South Korean organizations, expert Nick Lewis defines logic bomb attacks and offers other examples and countermeasures.20 Jun 2013
-
RSA Silver Tail improves online fraud detection, enterprise security
Fraud prevention for the Web: RSA Silver Tail sets stage for enterprise-level security with big data and brand new interface.19 Jun 2013
-
Users may remain vulnerable despite Oracle Java patch release
Oracle has issued a new security patch for Java, but only 7% deployed the patch before it.18 Jun 2013
-
Security School: Database security issues
Michael Cobb examines the top database security flaws and how to monitor database access to detect potential security incidents.18 Jun 2013
-
Gary McGraw: NSA data collection programs demand discussion, scrutiny
Opinion: Gary McGraw details the various and sundry NSA data collection programs and explains why all its efforts demand new discussion and scrutiny.17 Jun 2013
-
Enterprise BYOD offers mixed bag for enterprise endpoint security
A Gartner analyst says enterprise BYOD -- specifically iOS and Android devices -- presents many pros and cons for enterprise endpoint security.13 Jun 2013
Security Management Strategies for the CIO