• February 19, 2016 19 Feb'16

    DHS posts CISA rules for reporting cyberthreat indicators

    Roundup: DHS posts first pass at guidelines for cyberthreat indicator reporting under CISA. Plus, the U.S. planned a major cyberattack against Iran if nuclear diplomacy had failed, and more news.

  • February 18, 2016 18 Feb'16

    RSA Conference 2016 preview: IoT and encryption take center stage

    The Internet of Things once again dominates the agenda at RSA Conference 2016, but experts say there will be other hot topics, including the growing debate between IT and the government over encryption backdoors.

  • February 18, 2016 18 Feb'16

    Data breach lawsuits indicate a troubling trend for enterprises

    Data breaches are becoming more and more common -- as are class-action lawsuits from affected customers and employees. So, what are the costs of data breach lawsuits?

  • February 17, 2016 17 Feb'16

    Security startups vie for honors in RSA Innovation Sandbox

    The RSA 2016 Innovation Sandbox competition highlights the top security startups, but only one will be awarded title of 'RSA Conference 2016's Most Innovative Startup.'

  • February 17, 2016 17 Feb'16

    Court rules Apple needs iPhone backdoor; Tim Cook opposes

    A court order has ruled that Apple needs to create an iPhone backdoor to unlock the device used by the gunman in the San Bernardino killings, but Tim Cook opposed the ruling.

  • Sponsored News

    • The Key to Better DevOps Is in Your Data

      DevOps is a buzzword right now for good reason—it can deliver significant benefits. The 2016 State of DevOps Report, which surveyed 1,400 IT professionals around the world, paints a picture of high-performing IT development organizations: those with multiple code deployments per day and less than one-hour lead time between code fixes and production deployment. See More

    • How to: Protecting Your Data in the Cloud

      Your data is your company’s most valuable asset. Whether that’s system configurations, customer information, intellectual property, email or other communications, you need to put steps in place to protect it and establish processes to recover it in the event of a loss or some other incident. See More

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • Got Containers? You’ll Need a Way to Monitor Them

      The use of containers is growing rapidly. In a June 2016 survey conducted by Cloud Foundry and ClearPath Strategies, 64% of respondents said they plan to mainstream the use of containers in the next year. As the use of containers proliferates, it is essential to address monitoring to improve the performance, usage and troubleshooting of containers. However, effective monitoring requires an analytics-driven approach that not only informs developers and operations of what’s happening, but also offers those teams the ability to dig into their container usage and performance data to gain actionable insight. See More

    View All Sponsored News
  • February 16, 2016 16 Feb'16

    Ransomware attack causes internal emergency at Hollywood hospital

    The FBI, along with the LAPD, began investigating a ransomware attack at a Hollywood hospital that has crippled the facility's operations and could cost millions.

  • February 16, 2016 16 Feb'16

    RSA Conference 2016 special coverage: News and analysis

    Find out what's happening in the information security industry with breaking news by the SearchSecurity team at RSA's 2016 conference in San Francisco.

  • February 12, 2016 12 Feb'16

    Study: IT staff pressured to buy useless cybersecurity products

    A new study found that IT managers feel pressured to purchase new cybersecurity products even if they don't have the skills to implement the technology properly.

  • February 12, 2016 12 Feb'16

    Uncertainty over Privacy Shield as Facebook faces penalties

    Roundup: Details are uncertain for the EU-U.S. Privacy Shield framework, as Facebook is charged with privacy violations in France over the use of the now-illegal Safe Harbor framework; more news.

  • February 11, 2016 11 Feb'16

    IRS hack leveraged stolen Social Security numbers

    An IRS hack has compromised thousands of tax returns, and the attack was made possible through the use of stolen Social Security numbers.

  • February 10, 2016 10 Feb'16

    Congress Republicans rebuff Obama cyber budget effort

    Obama ups spending by 35% in the 2017 cyber budget, adds a federal CISO and pushes multifactor authentication, but still faces stiff Republican opposition in Congress.

  • February 09, 2016 09 Feb'16

    February 2016 Patch Tuesday: IE Flash vulnerabilities get a bulletin

    Microsoft's February 2016 Patch Tuesday release goes after Adobe Flash vulnerabilities and more Windows Journal flaws.

  • February 09, 2016 09 Feb'16

    Social engineering attack leads to leaked info on 20,000 FBI agents

    A hacker took advantage of insufficient authentication protocols within the DOJ to perform a social engineering attack, resulting in leaked info on 20,000 FBI agents.

  • February 05, 2016 05 Feb'16

    Researchers offer motive behind China cyberattacks

    Roundup: A new report may explain China's cyber targeting of health insurers. Plus, malware activity shows a big rise at year-end; more software vulnerabilities were reported.

  • February 04, 2016 04 Feb'16

    Former CIA/NSA director Hayden supports strong encryption

    Former CIA and NSA director General Michael Hayden came out in favor of strong encryption but representatives in Congress and the Senate are continuing to pursue encryption backdoor legislation.