News

News

  • February 01, 2016 01 Feb'16

    Threat defense, hybrid clouds and 'connections others miss'

    We often talk about shifts in information security from advanced threats to emerging technology defenses, but this year marks a few major turning points.

  • February 01, 2016 01 Feb'16

    Security attack? 2016 defenses focus on damage control

    What methods are attackers using to find vulnerabilities in corporate networks? Are these security attacks really advancing? We look at the latest hacking techniques and find out from top security researchers how malware and advanced cyberthreats ...

  • February 01, 2016 01 Feb'16

    Harvard report: Metadata means there is no 'going dark' for the FBI

    A new report from Harvard said data 'going dark' in the face of strong encryption shouldn't be a problem for law enforcement and intelligence agencies.

  • February 01, 2016 01 Feb'16

    IoT security issues unplugged

    A new ecosystem is needed for the Internet of Things and machine-to-machine communications, say thought leaders. But where does that leave security?

  • February 01, 2016 01 Feb'16

    Readers' top picks for DLP products

    The companies and DLP products that organizations consider, when they seek to address compliance and data security requirements across multiple platforms and environments.

  • Sponsored News

    • Got Containers? You’ll Need a Way to Monitor Them

      The use of containers is growing rapidly. In a June 2016 survey conducted by Cloud Foundry and ClearPath Strategies, 64% of respondents said they plan to mainstream the use of containers in the next year. As the use of containers proliferates, it is essential to address monitoring to improve the performance, usage and troubleshooting of containers. However, effective monitoring requires an analytics-driven approach that not only informs developers and operations of what’s happening, but also offers those teams the ability to dig into their container usage and performance data to gain actionable insight. See More

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • Avoid the Pain of Cloud Silos With Unified Management and Visibility

      Hybrid infrastructure is the result of a fundamental evolution of IT to the cloud, and it has become the norm for most midsize and larger organizations. As the prevalence of hybrid environments increases, one of the most confounding and troublesome problems to emerge is a lack of comprehensive management and visibility across the entire IT infrastructure—whether in the cloud or on premises. See More

    • A Threat Intelligence Service Case Study: The Escelar Trojan

      In this article we explore a case study: How Unit 42, Palo Alto Network’s threat intelligence and research team, used the AutoFocus threat intelligence service to detect and analyze the Escelar banking Trojan. See More

    View All Sponsored News
  • January 29, 2016 29 Jan'16

    Deadline looms for Safe Harbor framework successor

    Roundup: As the deadline looms to replace the Safe Harbor data-sharing framework, the U.S. and EU continue to make progress; Senate is ready to vote on the Judicial Redress Act.

  • January 29, 2016 29 Jan'16

    OpenSSL patch fixes encryption flaw and strengthens Logjam defense

    A new OpenSSL patch fixes a severe encryption flaw and strengthens the protocol against the Logjam vulnerability.

  • January 29, 2016 29 Jan'16

    Morphisec plans to bring back endpoint security – with a twist

    Security startup Morphisec has introduced a new approach to defending endpoint devices that turns the tables on attackers. Here's how the company's "moving target defense" technology works.

  • January 28, 2016 28 Jan'16

    Oracle closing an attack vector by deprecating the Java browser plug-in

    Oracle announced plans to deprecate the Java browser plug-in, a noted attack vector, though the choice was not entirely its own.

  • January 27, 2016 27 Jan'16

    Congress demands Juniper backdoor audits by government agencies

    Congressional oversight committee wants to know which U.S. government agencies used firewalls that may have been affected by the recently uncovered Juniper backdoor vulnerability.

  • January 26, 2016 26 Jan'16

    Fortinet SSH vulnerability more widespread than thought

    Fortinet denies that a vulnerability found in many of its products is a true backdoor, but finds that the flaw is more widespread than once thought.

  • January 22, 2016 22 Jan'16

    Will California ban smartphone encryption?

    News roundup: California mulls a ban on encrypted smartphone sales; France backs away from encryption backdoors; EU and U.K. privacy regulations; key escrow fail and more.

  • January 21, 2016 21 Jan'16

    Linux kernel vulnerability has unknown risk, but Google has fix

    A newly found Linux kernel vulnerability has garnered big headlines. Google said the risk to Android has been overstated, and experts are unsure about the danger to the wider Linux ecosystem.

  • January 20, 2016 20 Jan'16

    Cisco Security Report: Dwell time and encryption security struggles

    The Cisco Security Report for 2016 covered a lot of ground and adds to the encryption debate by noting that increased encryption creates more challenges for cybersecurity.

  • January 19, 2016 19 Jan'16

    David Chaum's cMix: New tool for anonymity on the Internet

    David Chaum presents Internet anonymity tool PrivaTegrity, using the cMix mix network for reliable, high-performance Internet anonymity and protection against attacks or unauthorized backdoors.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close