• March 10, 2015 10 Mar'15

    Rowhammer takes a big swing at DRAM memory security

    Google's Project Zero has detailed a new proof-of-concept exploiting the "rowhammer" DRAM flaw to allow for root access on various operating systems.

  • March 09, 2015 09 Mar'15

    For threat intelligence programs, ROI evaluation proves tricky

    Threat intelligence programs are taking root in many enterprises, but experts say variables like disparate service offerings, pricing models and response capabilities make ROI evaluation a vexing proposition.

  • March 09, 2015 09 Mar'15

    Group claiming links to Isis hacks small business websites

    The FBI is investigating the hacking of a number of SME websites in the US and Europe by people claiming affiliation with Islamic State

  • March 06, 2015 06 Mar'15

    Adobe's new twist on bug bounty programs: No cash for bug hunters

    News roundup: Bug bounty programs can offer big rewards to researchers, unless Adobe is handing out the prizes. Plus: Signal 2.0 encryption app; app cloning risk increasing; Angler adopts 'domain shadowing' capability.

  • March 05, 2015 05 Mar'15

    Microsoft confirms Windows vulnerable to FREAK attack

    The serious HTTPS FREAK exploit was thought to only affect Android, iOS, and MacOS, but Microsoft has confirmed that it also affects all supported versions of Windows.

  • Sponsored News

    • Is Your Active Directory Cloud Ready?

      Many companies today are considering a move to the cloud. Organizations may believe that a hosted service, such as Office 365, will be easier and or cheaper to maintain than on-prem email. Also, Microsoft and other industry leaders may have influenced a move. Whatever the reason, moving to the cloud isn’t as easy as it appears and results are often mixed if you haven’t adequately prepared your Active Directory. See More

    • Five Top Considerations in Architecting Your Network for the Future

      Network architects have more choices than ever when it comes to data center switches. From emerging categories such as white box switches to new powerful cloud spine switches built on custom chip sets, networks can now be designed with maximum flexibility to address a diverse range of price/performance requirements. See More

    • Examining the Active Directory’s Role in Governance, Risk, and Compliance

      When it comes to governance and compliance, much of the IT staff’s effort is often focused on individual systems. Administrators work meticulously to ensure that mail servers, file servers, database servers, and other resources adhere to both internal security standards and regulatory requirements. The one thing that each of these systems has in common however, is its reliance on Active Directory. First introduced in 2000 as a replacement to the Windows NT domain structure, Active Directory was originally designed to manage network resources. Now, Active Directory works as a centralized authentication and access control mechanism, and consequently plays a vital role in the organization’s overall security. See More

    • FAQ: A Guide to Increasing Automation in Data Center Switching

      By increasing automation in data center networks, IT decision makers can reduce costs and complexity, improve uptime, enhance agility and future-proof their network architectures. The issue is not whether to increase automation, but how to do so most effectively and cost-efficiently. See More

    View All Sponsored News
  • March 05, 2015 05 Mar'15

    Emerging cyberthreats exploit battle between compliance and security

    While regulatory compliance is valuable and necessary for enterprises, cyberthreat experts say a compliance-centric security strategy may leave organizations with few resources to ward off emerging cyberthreats.

  • March 05, 2015 05 Mar'15

    China and US cross swords over software backdoors

    Barack Obama criticises Chinese plans to force tech firms trading in China to share encryption keys and put backdoors in software

  • March 04, 2015 04 Mar'15

    Big data security analytics: Can it revolutionize information security?

    Demetrios Lazarikos describes the security big data system he implemented at retail giant Sears, as well as how it helped thwart retail fraud activity and how he convinced executives to support the implementation.

  • March 04, 2015 04 Mar'15

    Maturing NoSQL database security is key to big data analytics

    NoSQL database security has taken a backseat to performance in Hadoop-based security big data analytics systems, but that may soon change thanks to growing demand and maturing NoSQL security products.

  • March 02, 2015 02 Mar'15

    Q&A: Marcus Ranum chats with AT&T's CSO Ed Amoroso

    There's no shortage of new security technology, but enterprise integration is still a major hang-up, says AT&T's chief of security.

  • March 02, 2015 02 Mar'15

    Uber database breach source of stolen driver information

    Following the theft of data affecting about 50,000 of its drivers, Uber says it has filed a subpoena to obtain GitHub data that may pinpoint the source of its data breach.

  • March 02, 2015 02 Mar'15

    New scrutiny on bug bounties: Is there strength in numbers?

    Bug bounty programs are a cool idea and often work, so why haven't they taken off for non-tech companies?

  • March 02, 2015 02 Mar'15

    Is the bug bounty program concept flawed?

    Looking for security vulnerabilities? Tread lightly. The benefits of vulnerability rewards programs are great, but so are the risks.

  • March 02, 2015 02 Mar'15

    US retailer Natural Grocers investigates data breach

    Natural Grocers is the latest US retailer to announce it is investigating a possible data breach involving customer payment cards

  • February 27, 2015 27 Feb'15

    Data breach consequences: Get breached, make money?

    News roundup: Data breaches aren't associated with soaring stock prices, but recent examples show breaches may boost stocks. Plus: Gemalto confirms possibility of GHCQ/NSA hack; Target breach costs company $162 million; Superfish swims on.