• April 08, 2015 08 Apr'15

    Experts disagree on growth, complexity of cybersecurity threats

    The Websense 2015 Threat Report claims that cybersecurity threats are getting more complex, but one expert says the trends aren't anything new.

  • April 08, 2015 08 Apr'15

    Dyre malware returns to rob banks of millions

    Financial malware Dyre, in tandem with social engineering, was used in a new campaign to steal millions from financial institutions, according to IBM researchers.

  • April 06, 2015 06 Apr'15

    In first Android Security Report, Google cites drop in Android malware

    Google's first Android Security Report claims that malware on the platform was found on fewer than 1% of devices in 2014, but experts question if the ecosystem is really as safe as it has ever been.

  • April 05, 2015 05 Apr'15

    Amid SSL security issues, enterprises face many problems, few answers

    Experts say even enterprises that carefully secure TLS may still be at the mercy of the numerous security issues affecting the SSL ecosystem.

  • April 03, 2015 03 Apr'15

    U.S. cyberattacker sanctions program causes stir on social media

    News roundup: President Obama's executive order allowing sanctions on cyberattackers has been met with mixed reaction. Plus: Threat intelligence perception versus reality; healthcare breach consequences; Verizon tosses supercookie.

  • Sponsored News

    • Is Your Active Directory Cloud Ready?

      Many companies today are considering a move to the cloud. Organizations may believe that a hosted service, such as Office 365, will be easier and or cheaper to maintain than on-prem email. Also, Microsoft and other industry leaders may have influenced a move. Whatever the reason, moving to the cloud isn’t as easy as it appears and results are often mixed if you haven’t adequately prepared your Active Directory. See More

    • Five Top Considerations in Architecting Your Network for the Future

      Network architects have more choices than ever when it comes to data center switches. From emerging categories such as white box switches to new powerful cloud spine switches built on custom chip sets, networks can now be designed with maximum flexibility to address a diverse range of price/performance requirements. See More

    • Examining the Active Directory’s Role in Governance, Risk, and Compliance

      When it comes to governance and compliance, much of the IT staff’s effort is often focused on individual systems. Administrators work meticulously to ensure that mail servers, file servers, database servers, and other resources adhere to both internal security standards and regulatory requirements. The one thing that each of these systems has in common however, is its reliance on Active Directory. First introduced in 2000 as a replacement to the Windows NT domain structure, Active Directory was originally designed to manage network resources. Now, Active Directory works as a centralized authentication and access control mechanism, and consequently plays a vital role in the organization’s overall security. See More

    • FAQ: A Guide to Increasing Automation in Data Center Switching

      By increasing automation in data center networks, IT decision makers can reduce costs and complexity, improve uptime, enhance agility and future-proof their network architectures. The issue is not whether to increase automation, but how to do so most effectively and cost-efficiently. See More

    View All Sponsored News
  • April 02, 2015 02 Apr'15

    RSA Conference 2015 preview: Is IoT hype justified?

    The Internet of Things dominates the agenda at RSA Conference 2015, but experts believe enterprises should focus their attention on threat intelligence and other topics.

  • April 02, 2015 02 Apr'15

    Massive GitHub DDoS attack tied to Chinese government

    Security experts say the largest DDoS attack in GitHub history, which lasted five days, was the work of the Chinese government.

  • April 02, 2015 02 Apr'15

    Obama threatens foreign cyber attackers with sanctions

    US president Barack Obama has signed an executive order establishing a framework for the US to impose sanctions on foreign cyber attackers

  • April 01, 2015 01 Apr'15

    NSA’s big data security analytics reaches the enterprise with Sqrrl

    Competition for Hadoop-based analytics may put tools and services within reach for large and midsize organizations, says Robert Richardson.

  • April 01, 2015 01 Apr'15

    Information security jobs unfilled as labor pains grow

    Why cybersecurity hiring is the real cyberwar.

  • April 01, 2015 01 Apr'15

    Defending against the digital invasion

    As attackers move beyond “spray and pray” tactics to advanced persistent threats -- having better security than your competitors is no longer enough. Targeted attacks today are often for financial gain through extortion and threats to expose or ...

  • March 31, 2015 31 Mar'15

    Amid growing SSL concerns, Qualys expands free public SSL tester

    Qualys has added a free, public API to its SSL testing services, which will enable an enterprise to test any website or server for SSL vulnerabilities.

  • March 31, 2015 31 Mar'15

    New PCI SSC penetration testing guidelines aim to be more prescriptive

    The PCI SSC has issued prescriptive new supplemental guidance on penetration testing in an effort to reverse current trends and improve merchant compliance.

  • March 30, 2015 30 Mar'15

    PCI DSS 3.1 set for April 2015 release, will cover SSL vulnerabilities

    The PCI Security Standards Council has confirmed that PCI DSS 3.1 will be released in just a few weeks. According to a Gartner analyst, the surprise new release could cause major problems for merchants.

  • March 27, 2015 27 Mar'15

    Is the RSA 2015 'booth babe' ban a win for women in security?

    News roundup: The ban of "booth babes" at RSA Conference 2015 has been met with praise; does it equal an increase of women in infosec? Plus: Cyberthreat data-sharing bill advances; Flash flaw exploited days after patching; new twist on Google Play ...