-
Lavabit, Silent Circle close secure email rather than spill the goods
Lavabit and Silent Circle, both providers of secure communications for the consumer market, close under threat of U.S. government meddling.09 Aug 2013
-
Five major technology trends affecting software security assurance
Column: Gary McGraw says five shifts in the IT landscape are affecting software security, but several BSIMM best practices can limit risk exposure.09 Aug 2013
-
Enterprise app store encryption: Lessons to learn from Apple
After the Apple App Store's security mishap, expert Michael Cobb details the minimum enterprise app store encryption requirements.09 Aug 2013
-
Neohapsis: IPv4 plus IPv6 enables man-in-the-middle attacks
Neohapsis' Scott Behrens explains how having both IPv4 and IPv6 Internet protocols enabled can lead to man-in-the-middle attacks.09 Aug 2013
-
cold boot attack
A cold boot attack is a process for obtaining unauthorized access to encryption keys stored in the dynamic random access memory (DRAM) chips of a computer system.08 Aug 2013
-
Corporate compliance program: How to give a status update to the board
Expert Mike Chapple explains how to communicate the status of a corporate compliance program to the board, including both successes and shortcomings.08 Aug 2013
-
Identifying and locking down known Java security vulnerabilities
Expert Michael Cobb discusses why known Java security vulnerabilities are on so many endpoints and how to contain them -- without updating Java.08 Aug 2013
-
FortiGuard Labs sees fast rise of mobile malware in 2013
FortiGuard Labs reports a 30% increase in mobile malware so far in 2013, and cautions ransomware is also making an appearance on mobile devices.07 Aug 2013
-
SANS Top 20 Critical Security Controls vs. Defence Signals Directorate
Expert Michael Cobb compares the value of the SANS Top 20 Critical Security Controls with Australia's Defence Signals Directorate advice.07 Aug 2013
-
Cyber Security Summit
Date: 26th Nov, 2013
Location: QEII Conference Centre, London
07 Aug 2013 -
Unlock new pathways to network security EEL
Security teams are looking at new and different ways to isolate, monitor and control traffic within their data centers and extended networks.07 Aug 2013
-
Advanced threat-detection products emerge: Benefits and challenges
Traditional security tools are no longer sufficient for defending against new breeds of attacks, forcing advanced threat-detection products to emerge.06 Aug 2013
-
Radware's Ron Meyran discusses DoS attack tools, planning, execution
Ron Meyran, Radware's director of security solutions, answers our questions about DoS attack planning and execution.06 Aug 2013
-
Why securing internal applications is as important as Web-facing apps
Securing internal applications requires the same due diligence as their Web-facing counterparts. Expert Michael Cobb explains why.06 Aug 2013
-
Deploying network security devices: Tips to avoid failed deployments
John Burke offers advice on effectively deploying network security devices to protect sensitive data and manage the mobility boom in the enterprise.05 Aug 2013
-
Using free Web application security scanning tools to secure Web apps
Expert Michael Cobb explains how free Web application security scanning tools can help secure Web apps for budget-strapped organizations.05 Aug 2013
-
Black Hat 2013: Experts urge elliptical curve cryptography adoption
A session by a team of crypto experts at Black Hat USA 2013 argued that RSA and Diffie-Hellman should be abandoned in favor of ECC.02 Aug 2013
-
Black Hat 2013 attendance nears 7,500, tops 2012
Brief: GM Trey Ford said Black Hat 2013 attendance was up by 8% compared with last year's event. Ninety-eight new tools were introduced.01 Aug 2013
-
New data on enterprise mobile security
We polled readers in our annual Enterprise Mobile Security Survey and the 2013 results are in.01 Aug 2013
-
Black Hat 2013 keynote: Alexander details NSA surveillance programs
In his keynote at Black Hat 2013, Gen. Keith Alexander said NSA surveillance programs have strict oversight, despite many inaccurate media reports.01 Aug 2013
Security Management Strategies for the CIO