News

News

  • August 27, 2015 27 Aug'15

    CISOs: Application security programs need improvements

    An up-to-date application security program -- as well as knowing how to connect with stakeholders -- is critical to being a successful CISO today, said Renee Guttmann, vice president, Office of the CISO at Accuvant Inc.

  • August 25, 2015 25 Aug'15

    Report says SMB IT still doesn't get virtualization security

    A new report makes controversial claims about the costs of breaches in virtualized environments, strongly suggesting IT pros may not understand the challenges of virtualization security.

  • August 25, 2015 25 Aug'15

    Choosing a threat intelligence platform: What enterprises should know

    Video: Threat intelligence tools are a growing market and enterprises need to be able to see through the hype to get the best product for them.

  • August 20, 2015 20 Aug'15

    Is the future of cyberdefense a new branch of the military?

    An IT professional suggests the best way to improve cyberdefense and security in the public and private sectors may be a new branch of the military. But, according to one expert, the benefits of such a plan can be gained with the current setup.

  • August 19, 2015 19 Aug'15

    Critical out-of-band Microsoft security patch available for IE

    One week after Patch Tuesday, an out-of-band Microsoft security patch is available for a critical flaw in Internet Explorer that affects all supported versions of Windows and Windows Server.

  • Sponsored News

    • Got Containers? You’ll Need a Way to Monitor Them

      The use of containers is growing rapidly. In a June 2016 survey conducted by Cloud Foundry and ClearPath Strategies, 64% of respondents said they plan to mainstream the use of containers in the next year. As the use of containers proliferates, it is essential to address monitoring to improve the performance, usage and troubleshooting of containers. However, effective monitoring requires an analytics-driven approach that not only informs developers and operations of what’s happening, but also offers those teams the ability to dig into their container usage and performance data to gain actionable insight. See More

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • Avoid the Pain of Cloud Silos With Unified Management and Visibility

      Hybrid infrastructure is the result of a fundamental evolution of IT to the cloud, and it has become the norm for most midsize and larger organizations. As the prevalence of hybrid environments increases, one of the most confounding and troublesome problems to emerge is a lack of comprehensive management and visibility across the entire IT infrastructure—whether in the cloud or on premises. See More

    • A Threat Intelligence Service Case Study: The Escelar Trojan

      In this article we explore a case study: How Unit 42, Palo Alto Network’s threat intelligence and research team, used the AutoFocus threat intelligence service to detect and analyze the Escelar banking Trojan. See More

    View All Sponsored News
  • August 18, 2015 18 Aug'15

    Millions left at risk as Android Stagefright fix pushed to September

    The Android Stagefright vulnerability continues to put millions of users at risk because Google's first attempt at a patch did not work, and a new fix likely will not come until September.

  • August 18, 2015 18 Aug'15

    From CCSP to CISSP: A look at (ISC)2 cybersecurity certifications

    Video: Cybersecurity certifications are not in short supply, but (ISC)2 still dominates the field with CISSP and the new CCSP certification from its CSA partnership.

  • August 14, 2015 14 Aug'15

    Government email security woes widen with Pentagon breach and more

    News roundup: Government email security got pummeled this week with news of hacks, breaches, unlabeled classified data and spying. Plus: Hacking a Corvette via text; Android sandbox bypass flaw; Oracle CSO blogs against reverse-engineering.

  • August 14, 2015 14 Aug'15

    Dropbox adds support for U2F security keys

    Dropbox announced it is strengthening login options with support for universal 2nd factor (U2F) security keys with the aim of making two-step verification faster and easier.

  • August 13, 2015 13 Aug'15

    Bitdefender hack the latest cyberattack on security vendors

    Bitdefender suffered a data breach in which a hacker stole a small number of unencrypted usernames and passwords for active customers. The hacker then demanded $15,000 in ransom.

  • August 13, 2015 13 Aug'15

    Addressing wearables security, the next wave of BYOD concerns

    Wearables are the next wave of BYO devices infiltrating the enterprise. Domingo Guerra, president and co-founder of Appthority, talked to SearchSecurity at RSA Conference 2015 about how to address the onslaught.

  • August 12, 2015 12 Aug'15

    Darkhotel APT found using Hacking Team Flash zero-day in exploits

    The Darkhotel advanced persistent threat group used an Adobe Flash zero-day vulnerability from the Hacking Team data leak, according to Kaspersky research.

  • August 11, 2015 11 Aug'15

    Microsoft Office bug highlights August 2015 Patch Tuesday

    Microsoft's August 2015 Patch Tuesday may not be as packed with danger as a typical release, according to one expert, but does include critical bulletins for Microsoft Office and even one for the new Edge browser.

  • August 07, 2015 07 Aug'15

    ICANN breached, members' encrypted passwords stolen

    News roundup: ICANN confirmed its members' credentials were stolen Wednesday, forcing the nonprofit to enforce a site-wide password reset. Plus: VPN provider being used for APTs; Thunderstrike strikes again; Windows 10 security in its first week.

  • August 07, 2015 07 Aug'15

    Black Hat 2015: Machine learning security must add variety

    Machine learning is better at detecting malware than systems that scan for known signatures. But researchers at Black Hat 2015 say adding a twist widens the performance gap even further.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close