News

News

  • August 25, 2015 25 Aug'15

    Choosing a threat intelligence platform: What enterprises should know

    Video: Threat intelligence tools are a growing market and enterprises need to be able to see through the hype to get the best product for them.

  • August 20, 2015 20 Aug'15

    Is the future of cyberdefense a new branch of the military?

    An IT professional suggests the best way to improve cyberdefense and security in the public and private sectors may be a new branch of the military. But, according to one expert, the benefits of such a plan can be gained with the current setup.

  • August 19, 2015 19 Aug'15

    Critical out-of-band Microsoft security patch available for IE

    One week after Patch Tuesday, an out-of-band Microsoft security patch is available for a critical flaw in Internet Explorer that affects all supported versions of Windows and Windows Server.

  • August 18, 2015 18 Aug'15

    Millions left at risk as Android Stagefright fix pushed to September

    The Android Stagefright vulnerability continues to put millions of users at risk because Google's first attempt at a patch did not work, and a new fix likely will not come until September.

  • August 18, 2015 18 Aug'15

    From CCSP to CISSP: A look at (ISC)2 cybersecurity certifications

    Video: Cybersecurity certifications are not in short supply, but (ISC)2 still dominates the field with CISSP and the new CCSP certification from its CSA partnership.

  • Sponsored News

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • Choosing the Right Tools to Harness Big Data

      As the global business environment becomes more complex, IT departments must quickly figure out how to interact with, deliver and analyze the deluge of data from an ever-growing number of sources. For many organizations, harnessing the competitive power of the large data sets stored in their environments—known as big data—is leading the business strategy. See More

    • A Threat Intelligence Service Case Study: The Escelar Trojan

      In this article we explore a case study: How Unit 42, Palo Alto Network’s threat intelligence and research team, used the AutoFocus threat intelligence service to detect and analyze the Escelar banking Trojan. See More

    • Optimize Your Journey to Azure AD

      For IT managers under pressure to improve security while streamlining costs and resources, the decision to adopt cloud-based applications such as Office 365 is easy. Unfortunately, the transition from on-premises Active Directory to cloud-based Microsoft Azure Active Directory (Azure AD) or a hybrid solution may not be as easy as it would seem. Even those already operating in the cloud could benefit by optimizing their environments. See More

    View All Sponsored News
  • August 14, 2015 14 Aug'15

    Government email security woes widen with Pentagon breach and more

    News roundup: Government email security got pummeled this week with news of hacks, breaches, unlabeled classified data and spying. Plus: Hacking a Corvette via text; Android sandbox bypass flaw; Oracle CSO blogs against reverse-engineering.

  • August 14, 2015 14 Aug'15

    Dropbox adds support for U2F security keys

    Dropbox announced it is strengthening login options with support for universal 2nd factor (U2F) security keys with the aim of making two-step verification faster and easier.

  • August 13, 2015 13 Aug'15

    Bitdefender hack the latest cyberattack on security vendors

    Bitdefender suffered a data breach in which a hacker stole a small number of unencrypted usernames and passwords for active customers. The hacker then demanded $15,000 in ransom.

  • August 13, 2015 13 Aug'15

    Addressing wearables security, the next wave of BYOD concerns

    Wearables are the next wave of BYO devices infiltrating the enterprise. Domingo Guerra, president and co-founder of Appthority, talked to SearchSecurity at RSA Conference 2015 about how to address the onslaught.

  • August 12, 2015 12 Aug'15

    Darkhotel APT found using Hacking Team Flash zero-day in exploits

    The Darkhotel advanced persistent threat group used an Adobe Flash zero-day vulnerability from the Hacking Team data leak, according to Kaspersky research.

  • August 11, 2015 11 Aug'15

    Microsoft Office bug highlights August 2015 Patch Tuesday

    Microsoft's August 2015 Patch Tuesday may not be as packed with danger as a typical release, according to one expert, but does include critical bulletins for Microsoft Office and even one for the new Edge browser.

  • August 07, 2015 07 Aug'15

    ICANN breached, members' encrypted passwords stolen

    News roundup: ICANN confirmed its members' credentials were stolen Wednesday, forcing the nonprofit to enforce a site-wide password reset. Plus: VPN provider being used for APTs; Thunderstrike strikes again; Windows 10 security in its first week.

  • August 07, 2015 07 Aug'15

    Black Hat 2015: Machine learning security must add variety

    Machine learning is better at detecting malware than systems that scan for known signatures. But researchers at Black Hat 2015 say adding a twist widens the performance gap even further.

  • August 07, 2015 07 Aug'15

    Black Hat 2015: Rebuilding IT security after a cyber disaster

    In the wake of a major cyberattack, the process of rebuilding IT security can be daunting, but Christina Kubecka has some tips from her experiences with Saudi Aramco after a massive attack in 2012.

  • August 07, 2015 07 Aug'15

    Emerging security trends enterprises should keep an eye on

    Video: KPMG's Ronald Plesco discusses the main emerging security trends -- security analytics, the Internet of Things and virtualization -- and what else is on the horizon for the industry.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close