This Content Component encountered an error



  • November 07, 2014 07 Nov'14

    With expanded open Wi-Fi, are ISPs offering convenience or aiding criminals?

    News roundup: Open Wi-Fi allegedly aided a fugitive in evading authorities, highlighting Wi-Fi hotspot risks as ISPs including Comcast turn residential gateways into hotspots. Plus: Google's nogotofail tool; messaging apps fail EFF security review; ...

  • November 07, 2014 07 Nov'14

    Home Depot security breach: Losses include 53 million email addresses

    The email addresses were taken in addition to the 56 million debit and credit card numbers that were compromised as part of the massive data breach at the nation's biggest home-improvement retailer.

  • November 04, 2014 04 Nov'14

    Despite skeptics, security awareness training for employees is booming

    Employee security awareness training has been derided in the past, but new Gartner research suggests that a market of competitive, high-quality vendors are making security awareness a must-have.

  • November 01, 2014 01 Nov'14

    We honor the winners of Information Security Readers' Choice 2014

    More than 1,700 voters weighed in and helped us award this year's top security technologies in 22 categories.

  • October 31, 2014 31 Oct'14

    Browser vendors to disable SSL 3.0 in response to POODLE attack

    The outdated encryption protocol was spotlighted earlier this month when Google researchers released details on the POODLE attack, which preyed on systems that support the SSL 3.0 fallback mechanism.

  • Sponsored News

    • RAND Model Quantifies Staying Power of Security Technologies

      When you estimate the ROI of a new security technology, you usually assume that it will provide the same value year after year. But the RAND Corporation has developed a sophisticated new model of the costs and benefits of cybersecurity which has produced a surprising result. See More

    • Is Your Active Directory Cloud Ready?

      Many companies today are considering a move to the cloud. Organizations may believe that a hosted service, such as Office 365, will be easier and or cheaper to maintain than on-prem email. Also, Microsoft and other industry leaders may have influenced a move. Whatever the reason, moving to the cloud isn’t as easy as it appears and results are often mixed if you haven’t adequately prepared your Active Directory. See More

    • Top 4 Reasons Why Security and Networking Are Coming Together

      Until recently cybersecurity and networking could be treated as separate domains, with different devices, different management tools and different staffs. But that approach won’t fly today. This paper discusses why security needs to be integrated into networking equipment, monitoring and management. See More

    • Examining the Active Directory’s Role in Governance, Risk, and Compliance

      When it comes to governance and compliance, much of the IT staff’s effort is often focused on individual systems. Administrators work meticulously to ensure that mail servers, file servers, database servers, and other resources adhere to both internal security standards and regulatory requirements. The one thing that each of these systems has in common however, is its reliance on Active Directory. First introduced in 2000 as a replacement to the Windows NT domain structure, Active Directory was originally designed to manage network resources. Now, Active Directory works as a centralized authentication and access control mechanism, and consequently plays a vital role in the organization’s overall security. See More

    View All Sponsored News
  • October 31, 2014 31 Oct'14

    Verizon's mobile persistent cookie is more trick than treat

    News roundup: Verizon gave its mobile users an early Halloween trick: a cookie that cannot be erased, despite a number of privacy concerns. Also: compromising an air-gapped computer over the air; an alleged government-funded hack against a CBS ...

  • October 30, 2014 30 Oct'14

    CurrentC breach raises questions about mobile-payment security

    CurrentC, the retailer-backed mobile-payment platform, admitted to the breach shortly after the Apple Pay competitor was blamed for shutting down other NFC-based payment options.

  • October 29, 2014 29 Oct'14

    McAfee security products to gain integrated threat intelligence feeds

    Customers and partners like the new effort by the Intel-owned security vendor to integrate threat intelligence feeds with all of its existing products, but analysts are leery of lacking threat intelligence standards.

  • October 29, 2014 29 Oct'14

    White House hack confirmed; state-affiliated actors suspected

    State-affiliated actors, possibly tied to the Russian government, are thought to be behind a newly confirmed breach of the White House's unclassified computer network.

  • October 27, 2014 27 Oct'14

    Research finds more organizations use big data analytics for security

    Research from Nemertes shows an increasing percentage of enterprises are utilizing big data analytics for security as traditional defenses fail to hold off attackers.

  • October 24, 2014 24 Oct'14

    Symantec pcAnywhere end-of-life highlights Big Yellow's many stumbles

    News roundup: As the trouble-ridden pcAnywhere's end-of-life nears, it highlights how Symantec snatched defeat from the jaws of victory. Plus: F-Secure raises the bar on privacy policy; Lifehacker breaking bad during Evil Week; and Americans fear ID...

  • October 24, 2014 24 Oct'14

    Report: Backoff malware infections spiked in recent months

    A report from security vendor Damballa shows that the Backoff malware variant has infected an increasing number of point-of-sale systems in recent months.

  • October 21, 2014 21 Oct'14

    Suspected Staples breach under investigation

    The Staples breach is suspected to have affected payment card information in an as-yet-undetermined number of the office supply chain's stores in the northeast U.S.

  • October 20, 2014 20 Oct'14

    How Apple Pay security controls may mitigate payment card breaches

    The newly launched Apple Pay mobile payment system could deliver the most secure shopping experience for U.S. customers yet, though it still may not be perfect.

  • October 17, 2014 17 Oct'14

    October 2014 Oracle CPU fixes 25 Java vulnerabilities, 154 total flaws

    The October 2014 Oracle CPU delivered fixes for 154 unique bugs, with Java vulnerabilities making up the bulk of the most pressing updates.