• March 09, 2016 09 Mar'16

    Crowdsourced vulnerability patching could save us all

    Patching systems can be time-consuming and troublesome, so one expert suggests crowdsourced vulnerability patching to make the process faster and easier.

  • March 08, 2016 08 Mar'16

    March 2016 Patch Tuesday highlights Windows 10 security

    Microsoft's March 2016 Patch Tuesday release has put Windows 10 security on display for good and bad, experts say.

  • March 04, 2016 04 Mar'16

    AI may soon find and patch a software bug automatically

    The cybersecurity industry is getting closer to artificial intelligence that can find and patch software bugs automatically, but that same tech could lead to autonomous hacking.

  • March 04, 2016 04 Mar'16

    McCaul pitches encryption commission to solve 'going dark' problem

    Rep. Michael McCaul makes the case for encryption commission legislation as an answer to the 'going dark' problem in the face of global cyberthreats.

  • March 03, 2016 03 Mar'16

    Military-grade security focuses on isolation and action

    Presenters at the RSA Conference 2016 said military-grade security for enterprise networks is possible by taking a zero-tolerance policy to network traffic.

  • Sponsored News

    • The Key to Better DevOps Is in Your Data

      DevOps is a buzzword right now for good reason—it can deliver significant benefits. The 2016 State of DevOps Report, which surveyed 1,400 IT professionals around the world, paints a picture of high-performing IT development organizations: those with multiple code deployments per day and less than one-hour lead time between code fixes and production deployment. See More

    • How to: Protecting Your Data in the Cloud

      Your data is your company’s most valuable asset. Whether that’s system configurations, customer information, intellectual property, email or other communications, you need to put steps in place to protect it and establish processes to recover it in the event of a loss or some other incident. See More

    • Got Containers? You’ll Need a Way to Monitor Them

      The use of containers is growing rapidly. In a June 2016 survey conducted by Cloud Foundry and ClearPath Strategies, 64% of respondents said they plan to mainstream the use of containers in the next year. As the use of containers proliferates, it is essential to address monitoring to improve the performance, usage and troubleshooting of containers. However, effective monitoring requires an analytics-driven approach that not only informs developers and operations of what’s happening, but also offers those teams the ability to dig into their container usage and performance data to gain actionable insight. See More

    • Cloud-Based Disaster Recovery

      Our world has become increasingly complex. In the past, the most likely cause of system downtime was either equipment failure or a power outage. Today, there are new threats to your business operations, including data breaches, ransomware and other malicious activities. See More

    View All Sponsored News
  • March 03, 2016 03 Mar'16

    Cybersecurity checklist a strategy tool for increasing attack costs

    The U.S. Cyber Consequences Unit rolled out a new version of its cybersecurity checklist, which it claims will help reduce attacks by increasing the costs of those attacks.

  • March 03, 2016 03 Mar'16

    Admiral Rogers, chief of U.S. Cyber Command, seeks cooperation

    Private sector cooperation with the government is key to successful protection against cyberthreats, says U.S. Cyber Command chief Michael Rogers in an address to RSA Conference 2016.

  • March 03, 2016 03 Mar'16

    DOD announces 'Hack the Pentagon' bug bounty program

    Defense Secretary Ashton Carter announces the 'Hack the Pentagon' bug bounty program and new Defense Innovation Advisory Board to be headed by Eric Schmidt.

  • March 03, 2016 03 Mar'16

    Government encryption backdoor debate is more nuanced at RSAC

    RSAC panelists had a spirited and nuanced debate about government encryption backdoors, and the topic is more difficult to parse than expected.

  • March 02, 2016 02 Mar'16

    Cybercrime trends point to growing sophistication

    Sophos' James Lyne warns that cybercriminals are becoming more effective, thanks to document-based malware and advanced social engineering techniques.

  • March 02, 2016 02 Mar'16

    Bruce Schneier on IBM grabbing him up with Resilient Systems

    Bruce Schneier chats with SearchSecurity during lunch at RSAC about IBM's plans to acquire Resilient Systems to complete their security offering.

  • March 02, 2016 02 Mar'16

    Diffie, Hellman win Turing Award; cryptography research update

    Diffie, Hellman receive Turing Award and experts review cryptography research, Apple vs. FBI, Juniper backdoors, quantum crypto and the future of cryptography.

  • March 01, 2016 01 Mar'16

    Incident response procedures speed discovery-response time

    Many companies become aware of a security event but take hours or days to perform triage and finally remediate it. Incident response procedures can vary based on the organization, and the type of security incident, which could involve DDoS attacks, ...

  • March 01, 2016 01 Mar'16

    Yoran: Solve cybersecurity challenges with creativity, encryption

    Amit Yoran kicked off RSAC 2016 by publicly backing strong encryption, denouncing the 'going dark' debate and calling for more creativity in cybersecurity.

  • March 01, 2016 01 Mar'16

    Microsoft sounds the bell for strong encryption, privacy

    Microsoft's top lawyer criticized the U.S. government's efforts to undermine strong encryption, and called on the industry to support and defend the technology.