Depending on its usage, crypto can be a short form for cryptography or for encryption. The term is sometimes used to broadly encompass the major aspects and issues of developing and using cryptography technologies.
The information security pro’s resource for keeping corporate data, applications and devices secure
Download Now!Definition
Depending on its usage, crypto can be a short form for cryptography or for encryption. The term is sometimes used to broadly encompass the major aspects and issues of developing and using cryptography technologies.
Adobe Reader X uses Microsoft's sandboxing technology to block potentially dangerous processes from executing beyond the confines of the software.
Microsoft repaired four vulnerabilities in its Forefront Unified Access Gateway and a critical flaw in Microsoft Office.
Download the entire October 2010 issue of Information Security magazine here in PDF format.
When storing data in the cloud, ignoring the physical location of cloud data is a major mistake. Learn how to prevent data location security issues.
A custom cloud infrastructure requires a special set of security controls. Get advice on how to implement hybrid cloud security the right way.
They're not perfect, but SOC 2 reports are becoming the baseline for cloud provider security assessments. Expert Dave Shackleford discusses.
One big debate right now is whether employees should use local applications or mobile Web-based services. There are use cases for each kind of app.
Organizations are warming up to NAC security products due to popularity of BYOD for robust device security and better systems integration.
Managing endpoints in the BYOD era isn't easy, and you have to come at it with the right attitude. Focus more on access and less on device control.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.
The latest variant of the banking Trojan is causing numerous problems, Symantec said.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
Assessing your organization's security threats and risks takes just five steps, says Robbie Higgins. Check out his quick guide to the SMB security risk assessment process.
A session by a team of crypto experts at Black Hat USA 2013 argued that RSA and Diffie-Hellman should be abandoned in favor of ECC.
Firewalls and antivirus are ineffective in the face of APT attacks. Expert Nick Lewis offers suggestions for advanced persistent threat protection.
In biggest security acquisition since 2011, Cisco has announced it will buy IDS maker Sourcefire for $2.7 billion.
The Indian banking system is at the begining of a new era, driven by mobile technology, but the widening of access to banking services brings with it security risks
Automation is the most effective way to tackle multiple prolonged cyber attacks on web applications, a study has confirmed
BlackBerry is ready to provide Indian law enforcement authorities with a way to track emails, email attachments and chats sent over its services
The government wants to put half of all new IT spending through small IT suppliers – doubling the previous target
Mike Timlett's career as an IT director has tracked the rise of mobile technologies that empower new business processes
Cisco is launching its National Virtual Incubator to harness innovation and incubation across the UK.