• December 10, 2015 10 Dec'15

    FBI: Encryption backdoor laws are unnecessary, if companies comply

    FBI Director James Comey is sticking to the message that the FBI doesn't want encryption backdoor legislation, but one senator doesn't expect companies to comply without the legal impetus.

  • December 10, 2015 10 Dec'15

    FBI admits to using zero-day exploits, not disclosing them

    The FBI has admitted to using zero-day exploits rather than disclosing them, and experts say this should not be a surprise considering the history of federal agency actions.

  • December 08, 2015 08 Dec'15

    December 2015 Patch Tuesday: DNS query and zero-day flaws fixed

    Microsoft's December 2015 Patch Tuesday brought a number of fixes to Windows, including a patch for a DNS query bug and zero-day flaws in the Windows kernel and Microsoft Office.

  • December 08, 2015 08 Dec'15

    Temporary workers cause access management troubles over the holidays

    A new report showed that while retail companies are confident in their security, many use bad access-management practices with temporary workers brought in for the holiday season.

  • December 04, 2015 04 Dec'15

    HTML5 support could mean Adobe Flash end of life

    Adobe moves could signal the end of the ever-vulnerable Flash Player, and experts say more support for HTML5 could lead to the Adobe Flash end of life.

  • Sponsored News

    • The Key to Better DevOps Is in Your Data

      DevOps is a buzzword right now for good reason—it can deliver significant benefits. The 2016 State of DevOps Report, which surveyed 1,400 IT professionals around the world, paints a picture of high-performing IT development organizations: those with multiple code deployments per day and less than one-hour lead time between code fixes and production deployment. See More

    • How to: Protecting Your Data in the Cloud

      Your data is your company’s most valuable asset. Whether that’s system configurations, customer information, intellectual property, email or other communications, you need to put steps in place to protect it and establish processes to recover it in the event of a loss or some other incident. See More

    • Got Containers? You’ll Need a Way to Monitor Them

      The use of containers is growing rapidly. In a June 2016 survey conducted by Cloud Foundry and ClearPath Strategies, 64% of respondents said they plan to mainstream the use of containers in the next year. As the use of containers proliferates, it is essential to address monitoring to improve the performance, usage and troubleshooting of containers. However, effective monitoring requires an analytics-driven approach that not only informs developers and operations of what’s happening, but also offers those teams the ability to dig into their container usage and performance data to gain actionable insight. See More

    • Cloud-Based Disaster Recovery

      Our world has become increasingly complex. In the past, the most likely cause of system downtime was either equipment failure or a power outage. Today, there are new threats to your business operations, including data breaches, ransomware and other malicious activities. See More

    View All Sponsored News
  • December 04, 2015 04 Dec'15

    First-ever high-level talks on US-China cyber issues

    News roundup: Chinese hacking activity drops in advance of US-China cyber talks, Australia blames China for major breach, mature malware, National Security Letter unveiled, and more.

  • December 04, 2015 04 Dec'15

    Alleged OPM breach hackers arrested by Chinese government

    Hackers arrested by the Chinese government are allegedly the criminals behind the OPM breach, but experts want more evidence before trusting China.

  • December 03, 2015 03 Dec'15

    Experts question customized TLS implementation after Amazon s2n flaw

    Amazon's s2n passed its first test by patching a flaw quickly, but experts said enterprises still need to be wary of the complexities surrounding TLS implementation.

  • December 01, 2015 01 Dec'15

    Amex credit card hack predicts replacement card number

    Samy Kamkar found a weakness in the algorithm American Express uses to generate replacement card information and created a credit card hack as a proof-of-concept.

  • November 24, 2015 24 Nov'15

    Dell fixes root certificate issue reminiscent of Superfish

    Dell issued a fix for a root certificate similar to Superfish that could potentially allow attackers to intercept encrypted private data on its PCs.

  • November 23, 2015 23 Nov'15

    Lessons learned from the Adobe data breach

    Adobe CSO Brad Arkin spoke at the recent Privacy. Security. Risk. 2015 event about his experiences dealing with the company's massive data breach two years ago.

  • November 20, 2015 20 Nov'15

    Safe Harbor framework update in danger of capsizing

    News roundup: Rights groups join critics of Safe Harbor framework update, OPM breach testimony pushback, FBI hiring part of cybersecurity issue for Justice Department. Plus: recycled malware, Microsoft's security push.

  • November 19, 2015 19 Nov'15

    Experts: DNSSEC protocol can't be worse than certificate authorities

    The DNSSEC protocol is a flawed solution to certificate authorities, but experts said any controversy surrounding the potential spying is more misunderstanding than fact.

  • November 19, 2015 19 Nov'15

    TechTarget Survey: IT risk management, compliance top tasks

    TechTarget 2015 Annual Salary and Careers Survey: Out of the myriad of security responsibilities for an enterprise, IT risk management and regulatory compliance occupy the most time.

  • November 18, 2015 18 Nov'15

    Going dark: FBI continues effort to bypass encryption

    The FBI's effort to gain access to encrypted devices and data has led to a standoff with technology companies, such as Apple. Here's where the 'going-dark' debate stands.