• June 11, 2015 11 Jun'15

    Dark Web scanner promises to cut data breach detection time to seconds

    As the focus of security moves to detection and response, a new product aims to find stolen corporate data within seconds or minutes of a data breach occurring by crawling the dark Web, but one expert questions the need for such a product.

  • June 11, 2015 11 Jun'15

    FIDO Alliance gains momentum, adds government support

    Agencies from U.S. and U.K. governments now support the FIDO Alliance and its open standards for passwordless authentication.

  • June 11, 2015 11 Jun'15

    Duqu malware makes a comeback and infiltrates Kaspersky systems

    The first strain of Duqu malware was found in late 2011. Now three and a half years later, Duqu 2.0 has emerged and is exploiting as many as three zero-day vulnerabilities in a new attack campaign.

  • June 11, 2015 11 Jun'15

    From the frontlines: Horror stories on information breach response

    Video: KPMG's Ronald Plesco has seen some crazy things in his time helping organizations in security incident response, and he shares some of them with SearchSecurity.

  • June 09, 2015 09 Jun'15

    June 2015 Patch Tuesday brings critical IE security fix, Flash update

    Microsoft's June 2015 Patch Tuesday features eight bulletins, including a critical update for Internet Explorer and Windows Media Player. Plus: Adobe releases fix for 13 Flash vulnerabilities.

  • Sponsored News

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • Choosing the Right Tools to Harness Big Data

      As the global business environment becomes more complex, IT departments must quickly figure out how to interact with, deliver and analyze the deluge of data from an ever-growing number of sources. For many organizations, harnessing the competitive power of the large data sets stored in their environments—known as big data—is leading the business strategy. See More

    • A Threat Intelligence Service Case Study: The Escelar Trojan

      In this article we explore a case study: How Unit 42, Palo Alto Network’s threat intelligence and research team, used the AutoFocus threat intelligence service to detect and analyze the Escelar banking Trojan. See More

    • Optimize Your Journey to Azure AD

      For IT managers under pressure to improve security while streamlining costs and resources, the decision to adopt cloud-based applications such as Office 365 is easy. Unfortunately, the transition from on-premises Active Directory to cloud-based Microsoft Azure Active Directory (Azure AD) or a hybrid solution may not be as easy as it would seem. Even those already operating in the cloud could benefit by optimizing their environments. See More

    View All Sponsored News
  • June 05, 2015 05 Jun'15

    Government data breach puts EINSTEIN defense system under question

    The FBI is investigating a government data breach in which up to 4 million records may have been stolen and China-based hackers are the prime suspects, but the efficacy of the DHS EINSTEIN defense system has been put under question.

  • June 05, 2015 05 Jun'15

    Vulnerability study questions accuracy of CVSS scores

    A new study claims social media may be a useful indicator of vulnerability risk and lead to more accurate CVSS scores and prioritization.

  • June 05, 2015 05 Jun'15

    Facebook, Google, Mozilla raise the bar with new user privacy controls

    News roundup: New settings and options to boost user privacy and security are emerging on major websites, but is it enough?

  • June 05, 2015 05 Jun'15

    McGraw: Software security testing is increasingly automated

    Security software expert Gary McGraw says testing for security flaws must be automated if everything is going to be checked.

  • June 03, 2015 03 Jun'15

    Adversaries never sleep: unknown malware downloaded every 34 seconds

    In its 2015 Security Report, Check Point Software has found adversaries are exploiting the ease of creating unknown malware to boost the chance of a successful attack, and sandboxing adoption may be the best way to mitigate risk.

  • June 03, 2015 03 Jun'15

    Schneier: Weighing the costs of mass surveillance

    Security expert Bruce Schneier says his new book, Data and Goliath, lays out a compelling case against government mass surveillance.

  • June 02, 2015 02 Jun'15

    Insecure mobile cloud backups leave millions of credentials exposed

    Researchers find that insecure implementation of cloud backups by mobile apps may affect hundreds of thousands of apps and leave as many as 56 million credentials exposed.

  • June 02, 2015 02 Jun'15

    Malware analysis beyond the sandbox

    Researchers estimate that 70% of organizations will have implemented virtual servers by the end of 2015, representing a tipping point in enterprises’ adoption of virtualization. Virtual machines (VMs) must be protected from malware like other ...

  • May 29, 2015 29 May'15

    IRS breach shows the importance of PII security

    A breach of the IRS' Internet tax form service "Get Transcript" exposed the personal information and tax filings of thousands of people.

  • May 29, 2015 29 May'15

    Cybersecurity threat discussion (finally) in boardroom

    News roundup: Cybersecurity is finally garnering attention at the boardroom table, but not necessarily for the right reasons. Plus: Ponemon's "Cost of Data Breach"; D-Link vulnerabilities; NitlovePOS; bad bots.