News

News

  • December 08, 2015 08 Dec'15

    Temporary workers cause access management troubles over the holidays

    A new report showed that while retail companies are confident in their security, many use bad access-management practices with temporary workers brought in for the holiday season.

  • December 04, 2015 04 Dec'15

    HTML5 support could mean Adobe Flash end of life

    Adobe moves could signal the end of the ever-vulnerable Flash Player, and experts say more support for HTML5 could lead to the Adobe Flash end of life.

  • December 04, 2015 04 Dec'15

    First-ever high-level talks on US-China cyber issues

    News roundup: Chinese hacking activity drops in advance of US-China cyber talks, Australia blames China for major breach, mature malware, National Security Letter unveiled, and more.

  • December 04, 2015 04 Dec'15

    Alleged OPM breach hackers arrested by Chinese government

    Hackers arrested by the Chinese government are allegedly the criminals behind the OPM breach, but experts want more evidence before trusting China.

  • December 03, 2015 03 Dec'15

    Experts question customized TLS implementation after Amazon s2n flaw

    Amazon's s2n passed its first test by patching a flaw quickly, but experts said enterprises still need to be wary of the complexities surrounding TLS implementation.

  • Sponsored News

    • Got Containers? You’ll Need a Way to Monitor Them

      The use of containers is growing rapidly. In a June 2016 survey conducted by Cloud Foundry and ClearPath Strategies, 64% of respondents said they plan to mainstream the use of containers in the next year. As the use of containers proliferates, it is essential to address monitoring to improve the performance, usage and troubleshooting of containers. However, effective monitoring requires an analytics-driven approach that not only informs developers and operations of what’s happening, but also offers those teams the ability to dig into their container usage and performance data to gain actionable insight. See More

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • Avoid the Pain of Cloud Silos With Unified Management and Visibility

      Hybrid infrastructure is the result of a fundamental evolution of IT to the cloud, and it has become the norm for most midsize and larger organizations. As the prevalence of hybrid environments increases, one of the most confounding and troublesome problems to emerge is a lack of comprehensive management and visibility across the entire IT infrastructure—whether in the cloud or on premises. See More

    • A Threat Intelligence Service Case Study: The Escelar Trojan

      In this article we explore a case study: How Unit 42, Palo Alto Network’s threat intelligence and research team, used the AutoFocus threat intelligence service to detect and analyze the Escelar banking Trojan. See More

    View All Sponsored News
  • December 01, 2015 01 Dec'15

    Amex credit card hack predicts replacement card number

    Samy Kamkar found a weakness in the algorithm American Express uses to generate replacement card information and created a credit card hack as a proof-of-concept.

  • November 24, 2015 24 Nov'15

    Dell fixes root certificate issue reminiscent of Superfish

    Dell issued a fix for a root certificate similar to Superfish that could potentially allow attackers to intercept encrypted private data on its PCs.

  • November 23, 2015 23 Nov'15

    Lessons learned from the Adobe data breach

    Adobe CSO Brad Arkin spoke at the recent Privacy. Security. Risk. 2015 event about his experiences dealing with the company's massive data breach two years ago.

  • November 20, 2015 20 Nov'15

    Safe Harbor framework update in danger of capsizing

    News roundup: Rights groups join critics of Safe Harbor framework update, OPM breach testimony pushback, FBI hiring part of cybersecurity issue for Justice Department. Plus: recycled malware, Microsoft's security push.

  • November 19, 2015 19 Nov'15

    Experts: DNSSEC protocol can't be worse than certificate authorities

    The DNSSEC protocol is a flawed solution to certificate authorities, but experts said any controversy surrounding the potential spying is more misunderstanding than fact.

  • November 19, 2015 19 Nov'15

    TechTarget Survey: IT risk management, compliance top tasks

    TechTarget 2015 Annual Salary and Careers Survey: Out of the myriad of security responsibilities for an enterprise, IT risk management and regulatory compliance occupy the most time.

  • November 18, 2015 18 Nov'15

    Going dark: FBI continues effort to bypass encryption

    The FBI's effort to gain access to encrypted devices and data has led to a standoff with technology companies, such as Apple. Here's where the 'going-dark' debate stands.

  • November 13, 2015 13 Nov'15

    FBI accused of paying Carnegie Mellon $1M to hack Tor network

    The Tor Project said that the Carnegie Mellon researchers behind an attack on the hidden service subsystem carried out last year were paid $1 million by the FBI to hack Tor network.

  • November 13, 2015 13 Nov'15

    Java vulnerability caused by unpatched open source library

    News roundup: WebSphere, JBoss, Jenkins and more hit by Java vulnerability in an open source library. Plus, SAP HANA deals with critical vulnerabilities, and more.

  • November 11, 2015 11 Nov'15

    November 2015 Patch Tuesday: Font handling strikes again

    Microsoft's November 2015 Patch Tuesday delivers 12 total bulletins, four of which are critical, and one issue with font handling that angers one expert.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close