• November 26, 2014 26 Nov'14

    (ISC)2 board chairman: 'We've definitely turned it around'

    (ISC)2 Board Chairman Wim Remes, who is seeking re-election, details the organization's management changes and efforts to boost member engagement in this interview.

  • November 25, 2014 25 Nov'14

    Regin malware: Why did it take so long to uncover?

    Industry observers say the unveiling of the Regin malware, which came after more than half a decade in the wild, highlights the need for better detection methods.

  • November 24, 2014 24 Nov'14

    Non-traditional employee recruitment may remedy security hiring woes

    With viable job and training opportunities finally emerging, the time is now for CISOs and hiring managers to boost infosec's ranks with non-traditional candidates.

  • November 21, 2014 21 Nov'14

    SSDP DDoS attacks driving up average DDoS sizes

    New research shows that average DDoS attacks are growing larger and more prevalent as attackers have moved to exploit SSDP, the latest protocol to be abused for its amplification factor.

  • November 21, 2014 21 Nov'14

    Encryption everywhere: Debating the risks and rewards

    News roundup: As the industry responds to growing demand for end-to-end Internet encryption, some fear unintended consequences. Plus: Black hats wanted; Windows Phone survives Pwn2Own; webcam spying resurgence.

  • Sponsored News

    • Is Your Active Directory Cloud Ready?

      Many companies today are considering a move to the cloud. Organizations may believe that a hosted service, such as Office 365, will be easier and or cheaper to maintain than on-prem email. Also, Microsoft and other industry leaders may have influenced a move. Whatever the reason, moving to the cloud isn’t as easy as it appears and results are often mixed if you haven’t adequately prepared your Active Directory. See More

    • Five Top Considerations in Architecting Your Network for the Future

      Network architects have more choices than ever when it comes to data center switches. From emerging categories such as white box switches to new powerful cloud spine switches built on custom chip sets, networks can now be designed with maximum flexibility to address a diverse range of price/performance requirements. See More

    • Examining the Active Directory’s Role in Governance, Risk, and Compliance

      When it comes to governance and compliance, much of the IT staff’s effort is often focused on individual systems. Administrators work meticulously to ensure that mail servers, file servers, database servers, and other resources adhere to both internal security standards and regulatory requirements. The one thing that each of these systems has in common however, is its reliance on Active Directory. First introduced in 2000 as a replacement to the Windows NT domain structure, Active Directory was originally designed to manage network resources. Now, Active Directory works as a centralized authentication and access control mechanism, and consequently plays a vital role in the organization’s overall security. See More

    • FAQ: A Guide to Increasing Automation in Data Center Switching

      By increasing automation in data center networks, IT decision makers can reduce costs and complexity, improve uptime, enhance agility and future-proof their network architectures. The issue is not whether to increase automation, but how to do so most effectively and cost-efficiently. See More

    View All Sponsored News
  • November 20, 2014 20 Nov'14

    Staples breach update: Cyberinsurance may cover retailer's costs

    A new report links the Staples security breach to an intrusion at craft retailer Michaels. Meanwhile, Staples confirmed it had purchased cyberinsurace to cover the still unknown cost of its breach.

  • November 18, 2014 18 Nov'14

    Microsoft addresses Kerberos security flaw with critical out-of-band patch

    Originally scheduled by Microsoft as part of its November Patch Tuesday release, the out-of-band patch resolves a serious security vulnerability in Kerberos.

  • November 17, 2014 17 Nov'14

    Microsoft's Schannel security patch affecting TLS connections

    Microsoft admitted that MS14-066, released last week to patch a serious Schannel security vulnerability, is causing some users to drop TLS connections.

  • November 14, 2014 14 Nov'14

    Enterprise business leaders overconfident in basic security measures

    News roundup: A recent study revealed IT pros' confidence in implementing basic security measures is high, contradicting data that enterprises consistently fail to thwart basic attacks. Plus: BrowserStack hack lessons; responsible phishing reporting...

  • November 12, 2014 12 Nov'14

    Daily log monitoring selected for 2015 PCI special interest group

    Pain points related to finding indicators of compromise in system logs and CDE outsourcing have led to a pair of new PCI special interest groups that will begin work next year.

  • November 11, 2014 11 Nov'14

    Hefty November 2014 Patch Tuesday delivers four critical bulletins

    The zero-day patch was one of four critical bulletins Microsoft delivered as part of its largest Patch Tuesday release of 2014; a fifth critical bulletin was dropped at the last moment.

  • November 10, 2014 10 Nov'14

    Experts: Cyber risk management requires teamwork, preparation

    At the 2014 Advanced Cyber Security Center conference, industry experts touted the increasing importance of information sharing and incident preparation, yet also admitted both are easier said than done.

  • November 10, 2014 10 Nov'14

    Network security assessment should play part in M&A process

    Mergers and acquisitions present opportunities for attackers interested in valuable data, but experts say most enterprises fail to perform a network security assessment before proceeding with a deal.

  • November 07, 2014 07 Nov'14

    With expanded open Wi-Fi, are ISPs offering convenience or aiding criminals?

    News roundup: Open Wi-Fi allegedly aided a fugitive in evading authorities, highlighting Wi-Fi hotspot risks as ISPs including Comcast turn residential gateways into hotspots. Plus: Google's nogotofail tool; messaging apps fail EFF security review; ...

  • November 07, 2014 07 Nov'14

    Home Depot security breach: Losses include 53 million email addresses

    The email addresses were taken in addition to the 56 million debit and credit card numbers that were compromised as part of the massive data breach at the nation's biggest home-improvement retailer.