Editors' Picks
-
Gartner: Marketing, customer service must merge
Customers now own the business relationship, so companies need a coordinated approach to hear them, according to Gartner analysts at the research group’s annual conference.20 Mar 2012
-
Upcoming information technology conferences for midmarket CIOs
Check out these upcoming information technology conferences for the midmarket CIO, complete with dates, locations, topics and costs.14 Mar 2012
More Like This
-
Secunia: More focus needed on third-party application security
Secunia highlights the growing need for better third-party application security, plus Microsoft's security improvements, and the growing cost of zero-days.14 Mar 2013
-
Crafty click fraud Trojan uses left mouse click to evade detection
A Trojan horse waits for a left mouse click to execute each step of the infection process, according to new research from FireEye Inc.14 Dec 2012
-
Gary McGraw on evolution of BSIMM maturity framework
Video: McGraw discusses the past and future of the BSIMM maturity framework for software security, and how vendors like Adobe and Microsoft measure up.12 Mar 2013
-
Bing security: Is search engine poisoning a problem for Bing users?
Is Microsoft's Bing search engine more susceptible to search engine poisoning than Google? Expert Michael Cobb discusses Bing security.12 Mar 2013
-
McGraw: Mobile app security issues demand trustworthy computing
Video: Cigital's Gary McGraw discusses the top mobile app security issues, and why it's time to apply trustworthy computing concepts to mobile devices.08 Mar 2013
-
IPv6 security risks: How a teenager can hack IPv6 security
Video: Wolfgang Kandek discusses key IPv6 security risks, as well as how his teenage son was able to inadvertently hack IPv6 on his home network.08 Mar 2013
-
Defending against watering hole attacks: Consider using a secure VM
Expert Nick Lewis analyzes the techniques employed by watering hole attacks and discusses how to use a secure VM to defend enterprises against them.07 Mar 2013
-
Gartner revises IT spend forecast down
Slumping PC sales partly account for the downward revision in Gartner’s growth predictions for overall IT spending in 2013, but growth is on the horizon for 201402 Jul 2013
-
RSA 2013: Experts struggle to define offensive security, hacking back
Is offensive security or 'hacking back' a viable cyberdefense tactic? RSA Conference 2013 experts struggled to define the terms, never mind the role they play.05 Mar 2013
-
Cisco: Integration key to enterprise security strategy
Cisco's Chris Young says the vendor's enterprise security strategy, including the next-generation data center and SDN, hinges on Cisco's integration efforts.04 Mar 2013
-
PayPal's CISO on cybercrime prevention, Internet security issues
Video: PayPal CISO Michael Barrett discusses hot-button issues surrounding cybercrime prevention, Internet security and nation-state attacks.04 Mar 2013
-
RSA 2013 crowd awed by live 'sinkholing' in P2P botnet takeover
Tillmann Werner of CrowdStrike wowed onlookers with a live 'sinkholing' demonstration, taking down the Kelihos P2P botnet.04 Mar 2013
-
RSA 2013: Brad Arkin outlines state of Adobe security, update strategy
Video: Adobe software security chief Brad Arkin discusses how his firm is responding to the recent increase in zero-day flaws.28 Feb 2013
-
RSA 2013: Charney optimistic about the future of information security
In his RSA Conference 2013 keynote, Microsoft's Scott Charney struck an optimistic note when talking about the future of information security.27 Feb 2013
-
Vendors showcase MAM products that ease BYOD challenges at RSA 2013
RSA exhibitors offered a range of mobile application management solutions, intended to ease the challenges of monitoring BYOD environments.27 Feb 2013
-
Big data 2.0: CISOs push need to identify attack campaigns
CISOs at RSA Conference 2013 say identifying attack campaigns means taking security big data to the next level. The hard part? Finding data analysts.27 Feb 2013
-
Spear phishing, manpower drive Chinese APTs, says researcher at RSA 2013
Chinese cyberattacks rely on spear phishing and overwhelming numbers, not sophisticated attack methods, says a researcher at RSA Conference 2013.27 Feb 2013
-
Coviello pitches 'transformational' information security strategy
In a talk critical of cyberattack finger-pointing, Art Coviello stressed the need for infosec strategy to emphasize big data, interconnectivity.26 Feb 2013
Security Management Strategies for the CIO