• March 03, 2016 03 Mar'16

    Admiral Rogers, chief of U.S. Cyber Command, seeks cooperation

    Private sector cooperation with the government is key to successful protection against cyberthreats, says U.S. Cyber Command chief Michael Rogers in an address to RSA Conference 2016.

  • March 03, 2016 03 Mar'16

    DOD announces 'Hack the Pentagon' bug bounty program

    Defense Secretary Ashton Carter announces the 'Hack the Pentagon' bug bounty program and new Defense Innovation Advisory Board to be headed by Eric Schmidt.

  • March 03, 2016 03 Mar'16

    Government encryption backdoor debate is more nuanced at RSAC

    RSAC panelists had a spirited and nuanced debate about government encryption backdoors, and the topic is more difficult to parse than expected.

  • March 02, 2016 02 Mar'16

    Cybercrime trends point to growing sophistication

    Sophos' James Lyne warns that cybercriminals are becoming more effective, thanks to document-based malware and advanced social engineering techniques.

  • March 02, 2016 02 Mar'16

    Bruce Schneier on IBM grabbing him up with Resilient Systems

    Bruce Schneier chats with SearchSecurity during lunch at RSAC about IBM's plans to acquire Resilient Systems to complete their security offering.

  • Sponsored News

    • Got Containers? You’ll Need a Way to Monitor Them

      The use of containers is growing rapidly. In a June 2016 survey conducted by Cloud Foundry and ClearPath Strategies, 64% of respondents said they plan to mainstream the use of containers in the next year. As the use of containers proliferates, it is essential to address monitoring to improve the performance, usage and troubleshooting of containers. However, effective monitoring requires an analytics-driven approach that not only informs developers and operations of what’s happening, but also offers those teams the ability to dig into their container usage and performance data to gain actionable insight. See More

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • Avoid the Pain of Cloud Silos With Unified Management and Visibility

      Hybrid infrastructure is the result of a fundamental evolution of IT to the cloud, and it has become the norm for most midsize and larger organizations. As the prevalence of hybrid environments increases, one of the most confounding and troublesome problems to emerge is a lack of comprehensive management and visibility across the entire IT infrastructure—whether in the cloud or on premises. See More

    • A Threat Intelligence Service Case Study: The Escelar Trojan

      In this article we explore a case study: How Unit 42, Palo Alto Network’s threat intelligence and research team, used the AutoFocus threat intelligence service to detect and analyze the Escelar banking Trojan. See More

    View All Sponsored News
  • March 02, 2016 02 Mar'16

    Diffie, Hellman win Turing Award; cryptography research update

    Diffie, Hellman receive Turing Award and experts review cryptography research, Apple vs. FBI, Juniper backdoors, quantum crypto and the future of cryptography.

  • March 01, 2016 01 Mar'16

    Incident response procedures speed discovery-response time

    Many companies become aware of a security event but take hours or days to perform triage and finally remediate it. Incident response procedures can vary based on the organization, and the type of security incident, which could involve DDoS attacks, ...

  • March 01, 2016 01 Mar'16

    Yoran: Solve cybersecurity challenges with creativity, encryption

    Amit Yoran kicked off RSAC 2016 by publicly backing strong encryption, denouncing the 'going dark' debate and calling for more creativity in cybersecurity.

  • March 01, 2016 01 Mar'16

    Microsoft sounds the bell for strong encryption, privacy

    Microsoft's top lawyer criticized the U.S. government's efforts to undermine strong encryption, and called on the industry to support and defend the technology.

  • March 01, 2016 01 Mar'16

    Security incident handling: Prepare to find answers

    CISOs work in stressful scenarios. Before you face executives armed with questions about security incident handling, it's time to formulate some of your own.

  • February 26, 2016 26 Feb'16

    Lines drawn in iPhone backdoor case; Apple gets backup

    The public debate surrounding the iPhone backdoor case heats up; Apple and the FBI clarify their messages; and Apple gets legal support from major tech companies.

  • February 26, 2016 26 Feb'16

    Microsoft EMET vulnerability turns tool against itself

    Roundup: Microsoft EMET is vulnerable to exploit; it's time to update to v5.5.Plus; Dell, IBM and Gemalto research reports claim cybercriminals are getting smarter, bigger and faster.

  • February 24, 2016 24 Feb'16

    RSA Conference 2016: An opportunity to take a stand

    The technology industry has allowed the debate over encryption and "going dark" to get out of hand. But it can start to right that wrong at RSA Conference next week.

  • February 19, 2016 19 Feb'16

    PCI DSS 3.2 marks the end of major updates to the standard

    The PCI council has determined its data security standard is finally mature enough to forego significant updates, so PCI DSS 3.2 will be more of an incremental modification.

  • February 19, 2016 19 Feb'16

    DHS posts CISA rules for reporting cyberthreat indicators

    Roundup: DHS posts first pass at guidelines for cyberthreat indicator reporting under CISA. Plus, the U.S. planned a major cyberattack against Iran if nuclear diplomacy had failed, and more news.