• September 17, 2014 17 Sep'14

    Research finds holes in defense-in-depth security model

    The defense-in-depth security model is often touted as a must for enterprises, but research shows that security products often fail to do what they're supposed to.

  • September 17, 2014 17 Sep'14

    Apple rolls out more robust iCloud two-factor authentication

    Following a high-profile leak of celebrity photos, Apple has moved to improve its iCloud two-factor authentication mechanisms.

  • September 16, 2014 16 Sep'14

    Programmers unknowingly inherit development framework security issues

    Developers increasingly rely on a variety of open source components, but a VerSprite researcher warns that security issues accompany many popular frameworks.

  • September 15, 2014 15 Sep'14

    Apple Pay security: Hope abounds, but questions linger

    Security controls integrated into the new Apple Pay mobile payment system could strengthen the payment security ecosystem, but unanswered questions remain, like the ramifications of a lost iPhone.

  • September 12, 2014 12 Sep'14

    Situational awareness software raises surveillance questions

    News roundup: City-sponsored situational awareness software use at a music festival illustrates the importance of enterprise surveillance strategy evaluation. Plus: Apache Tomcat upgrade; OpenSSL security policy; and call center security concerns.

  • Sponsored News

    • Is Your Active Directory Cloud Ready?

      Many companies today are considering a move to the cloud. Organizations may believe that a hosted service, such as Office 365, will be easier and or cheaper to maintain than on-prem email. Also, Microsoft and other industry leaders may have influenced a move. Whatever the reason, moving to the cloud isn’t as easy as it appears and results are often mixed if you haven’t adequately prepared your Active Directory. See More

    • Five Top Considerations in Architecting Your Network for the Future

      Network architects have more choices than ever when it comes to data center switches. From emerging categories such as white box switches to new powerful cloud spine switches built on custom chip sets, networks can now be designed with maximum flexibility to address a diverse range of price/performance requirements. See More

    • Examining the Active Directory’s Role in Governance, Risk, and Compliance

      When it comes to governance and compliance, much of the IT staff’s effort is often focused on individual systems. Administrators work meticulously to ensure that mail servers, file servers, database servers, and other resources adhere to both internal security standards and regulatory requirements. The one thing that each of these systems has in common however, is its reliance on Active Directory. First introduced in 2000 as a replacement to the Windows NT domain structure, Active Directory was originally designed to manage network resources. Now, Active Directory works as a centralized authentication and access control mechanism, and consequently plays a vital role in the organization’s overall security. See More

    • FAQ: A Guide to Increasing Automation in Data Center Switching

      By increasing automation in data center networks, IT decision makers can reduce costs and complexity, improve uptime, enhance agility and future-proof their network architectures. The issue is not whether to increase automation, but how to do so most effectively and cost-efficiently. See More

    View All Sponsored News
  • September 11, 2014 11 Sep'14 breach shows poor website security testing

    Experts say the latest security breach of the website was caused by lacking security process maturity, downplaying the importance of website security testing.

  • September 11, 2014 11 Sep'14

    Time to end women and security stereotypes, says Facebook security pro

    Facebook's director of security operations says women can have successful careers in information security, and more diversity can help shift the playing field toward security defenders rather than attackers.

  • September 09, 2014 09 Sep'14

    September 2014 Patch Tuesday includes critical IE security fix

    Microsoft's September 2014 Patch Tuesday features four bulletins, including one critical update for Internet Explorer. Plus: Adobe releases a Flash fix, but delays a planned patch release for Reader and Acrobat.

  • September 09, 2014 09 Sep'14

    Home Depot confirms data breach began in April

    The home improvement retailer confirms its customers' payment card data was breached in an incident that is believed to have begun in April, likely compromising millions of card accounts.

  • September 09, 2014 09 Sep'14

    Home Depot confirms data breach began in April

    The home improvement retailer confirms its customers' payment card data was breached in an incident that is believed to have begun in April, likely compromising millions of card accounts.

  • September 08, 2014 08 Sep'14

    Heartbleed patch efforts ignored on thousands of websites

    Data from McAfee shows many organizations have yet to fully patch the Heartbleed vulnerability, and as many as 300,000 websites remain at risk.

  • September 05, 2014 05 Sep'14

    Goodwill breach highlights need for service provider due diligence

    News roundup: The recent Goodwill security breach has been blamed on a third-party service provider, highlighting the need for due diligence. Plus: Mobile device theft; Android app vulnerabilities and a 12-year-long cyber-espionage network.

  • September 04, 2014 04 Sep'14

    Card trail shows Home Depot data breach could be huge

    The reported Home Depot data breach may have affected stores nationwide over the course of several months if new data proves to be correct.

  • September 03, 2014 03 Sep'14

    Apple two-factor authentication fail leaves iCloud users vulnerable

    Apple's decision to not extend its two-factor authentication security mechanism to all iCloud services may leave users more vulnerable to attacks

  • September 02, 2014 02 Sep'14

    Apple and FBI launch iCloud hack investigation

    Apple and FBI investigate the breach of Apple’s iCloud causing fresh business concerns over cloud security