• May 27, 2016 27 May'16

    RSA: Cloud visibility, analytics crucial to enterprises

    RSA's Rashmi Knowles spoke with SearchCloudSecurity about enterprises struggling with security visibility, and how analytics and data science can help.

  • May 26, 2016 26 May'16

    Retiring obsolete SHA-1 and RC4 cryptographic algorithms, SSLv3 protocol

    Microsoft speeds deprecation of SHA-1, Google dropping support for RC4, SSLv3, as web software publishers approach end of life for obsolete cryptographic algorithms and protocols.

  • May 26, 2016 26 May'16

    New spec aims to improve DNS privacy with TLS

    In order to stop metadata snooping by law enforcement and hackers, a proposed spec aims to improve DNS privacy with TLS.

  • May 24, 2016 24 May'16

    Lieu, Hurd school House colleagues on cyberhygiene, defense

    Former computer science majors Lieu and Hurd wrote to their U.S. House of Representatives colleagues, urging improved awareness of cyber risks and cyberhygiene.

  • May 24, 2016 24 May'16

    Paul Vixie on IPv6 NAT, IPv6 security and Internet of Things

    Internet pioneer Paul Vixie spoke with SearchSecurity about IPv6 NAT, IPv6 and the Internet of Things, and the long, thankless path to deploying IPv6.

  • Sponsored News

    • The Key to Better DevOps Is in Your Data

      DevOps is a buzzword right now for good reason—it can deliver significant benefits. The 2016 State of DevOps Report, which surveyed 1,400 IT professionals around the world, paints a picture of high-performing IT development organizations: those with multiple code deployments per day and less than one-hour lead time between code fixes and production deployment. See More

    • How to: Protecting Your Data in the Cloud

      Your data is your company’s most valuable asset. Whether that’s system configurations, customer information, intellectual property, email or other communications, you need to put steps in place to protect it and establish processes to recover it in the event of a loss or some other incident. See More

    • Got Containers? You’ll Need a Way to Monitor Them

      The use of containers is growing rapidly. In a June 2016 survey conducted by Cloud Foundry and ClearPath Strategies, 64% of respondents said they plan to mainstream the use of containers in the next year. As the use of containers proliferates, it is essential to address monitoring to improve the performance, usage and troubleshooting of containers. However, effective monitoring requires an analytics-driven approach that not only informs developers and operations of what’s happening, but also offers those teams the ability to dig into their container usage and performance data to gain actionable insight. See More

    • Cloud-Based Disaster Recovery

      Our world has become increasingly complex. In the past, the most likely cause of system downtime was either equipment failure or a power outage. Today, there are new threats to your business operations, including data breaches, ransomware and other malicious activities. See More

    View All Sponsored News
  • May 24, 2016 24 May'16

    Sorry Mr. Snowden -- encryption isn't the only path to security

    Encryption shouldn't be used to protect people from themselves, especially if it gets in the way of innovation.

  • May 24, 2016 24 May'16

    Android N security updates leave unanswered questions

    Google unveiled the next version of its mobile OS, and Android N security will be improved in a few ways, although Google still can't fix OS updates.

  • May 20, 2016 20 May'16

    Senate bill would quash unlimited Rule 41 government hacks

    Rule 41 changes face bipartisan opposition in Senate with the Wyden-Paul bill to rein in the expansion of authority to let the government hack unlimited numbers of devices with a single warrant.

  • May 19, 2016 19 May'16

    ImageMagick calls into question responsible disclosure reporting

    The ImageTragick bug raises questions over responsible disclosure, as the flaw in the ImageMagick image-processing library exposes millions of websites to remote code execution.

  • May 19, 2016 19 May'16

    TeslaCrypt master key release confounds experts

    In a move that surprised and confused experts, the TeslaCrypt master key was released, effectively killing the ransomware.

  • May 18, 2016 18 May'16

    Android clickjacking attack research updated but questions remain

    New research claims more than 95% of Android devices are vulnerable to clickjacking attacks, but the true danger may not be that severe.

  • May 18, 2016 18 May'16

    Paul Vixie on the glibc bug, Internet crime and more

    Internet pioneer Paul Vixie spoke with SearchSecurity about Internet crime, the glibc bug and other pervasive vulnerabilities that may never be eradicated.

  • May 17, 2016 17 May'16

    Google Project Zero discloses dangerous Symantec vulnerability

    Google Project Zero disclosed a Symantec vulnerability that can be exploited with zero interaction and was described being as bad as it can possibly get.

  • May 13, 2016 13 May'16

    EMM software on every device? MobileIron makes the case

    MobileIron's enterprise mobile management software wasn't installed on the iPhone of San Bernardino shooter Syed Rizwan Farook. Was that the right move?

  • May 13, 2016 13 May'16

    FBI asked for responsible disclosure of Tor vulnerability

    A court filing is asking the FBI for responsible disclosure of the Tor vulnerability used to exploit the Tor browser and de-anonymize users during a criminal investigation.