News

News

  • September 01, 2015 01 Sep'15

    Warnings, neglect and a massive OPM data breach

    Why no one should have been surprised by the massive government Office of Personnel Management data hack.

  • September 01, 2015 01 Sep'15

    Chip and PIN migration slow as EMV deadline approaches

    A major deadline for EMV card adoption is just one month away. Can chip-and-PIN and chip-and-signature technology improve payment card security and reduce fraud?

  • August 31, 2015 31 Aug'15

    Qualcomm claims new mobile SoC will feature zero-day detection

    Qualcomm announced that its next flagship chipset will include Smart Protect, a feature designed for machine learning and zero-day detection on mobile devices.

  • August 28, 2015 28 Aug'15

    Tor vulnerabilities make the Dark Web too risky for the black market

    The Dark Web is where many shady deals can happen on the Internet, but Tor vulnerabilities have made it too risky for one of the largest online black markets to stay in business.

  • August 28, 2015 28 Aug'15

    Gula talks Nessus agents and Nessus cloud

    Video: SearchSecurity spoke with Tenable co-founder Ron Gula about recent additions to the Nessus feature set, including a version that lives in the cloud.

  • Sponsored News

    • Got Containers? You’ll Need a Way to Monitor Them

      The use of containers is growing rapidly. In a June 2016 survey conducted by Cloud Foundry and ClearPath Strategies, 64% of respondents said they plan to mainstream the use of containers in the next year. As the use of containers proliferates, it is essential to address monitoring to improve the performance, usage and troubleshooting of containers. However, effective monitoring requires an analytics-driven approach that not only informs developers and operations of what’s happening, but also offers those teams the ability to dig into their container usage and performance data to gain actionable insight. See More

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • Avoid the Pain of Cloud Silos With Unified Management and Visibility

      Hybrid infrastructure is the result of a fundamental evolution of IT to the cloud, and it has become the norm for most midsize and larger organizations. As the prevalence of hybrid environments increases, one of the most confounding and troublesome problems to emerge is a lack of comprehensive management and visibility across the entire IT infrastructure—whether in the cloud or on premises. See More

    • A Threat Intelligence Service Case Study: The Escelar Trojan

      In this article we explore a case study: How Unit 42, Palo Alto Network’s threat intelligence and research team, used the AutoFocus threat intelligence service to detect and analyze the Escelar banking Trojan. See More

    View All Sponsored News
  • August 27, 2015 27 Aug'15

    Report: phishing training could cut damage costs by $1.8M

    A new report breaks down the potential costs associated with a phishing breach and claims that phishing training could cut those costs by as much as $1.8 million.

  • August 27, 2015 27 Aug'15

    Angler EK and Flash zero-days make malvertising more effective

    Malvertising campaigns are becoming more effective due to the popularity of the Angler EK and its use of Flash zero-day vulnerabilities. And one expert says ad blockers are not the answer.

  • August 27, 2015 27 Aug'15

    CISOs: Application security programs need improvements

    An up-to-date application security program -- as well as knowing how to connect with stakeholders -- is critical to being a successful CISO today, said Renee Guttmann, vice president, Office of the CISO at Accuvant Inc.

  • August 25, 2015 25 Aug'15

    Report says SMB IT still doesn't get virtualization security

    A new report makes controversial claims about the costs of breaches in virtualized environments, strongly suggesting IT pros may not understand the challenges of virtualization security.

  • August 25, 2015 25 Aug'15

    Choosing a threat intelligence platform: What enterprises should know

    Video: Threat intelligence tools are a growing market and enterprises need to be able to see through the hype to get the best product for them.

  • August 20, 2015 20 Aug'15

    Is the future of cyberdefense a new branch of the military?

    An IT professional suggests the best way to improve cyberdefense and security in the public and private sectors may be a new branch of the military. But, according to one expert, the benefits of such a plan can be gained with the current setup.

  • August 19, 2015 19 Aug'15

    Critical out-of-band Microsoft security patch available for IE

    One week after Patch Tuesday, an out-of-band Microsoft security patch is available for a critical flaw in Internet Explorer that affects all supported versions of Windows and Windows Server.

  • August 18, 2015 18 Aug'15

    Millions left at risk as Android Stagefright fix pushed to September

    The Android Stagefright vulnerability continues to put millions of users at risk because Google's first attempt at a patch did not work, and a new fix likely will not come until September.

  • August 18, 2015 18 Aug'15

    From CCSP to CISSP: A look at (ISC)2 cybersecurity certifications

    Video: Cybersecurity certifications are not in short supply, but (ISC)2 still dominates the field with CISSP and the new CCSP certification from its CSA partnership.

  • August 14, 2015 14 Aug'15

    Government email security woes widen with Pentagon breach and more

    News roundup: Government email security got pummeled this week with news of hacks, breaches, unlabeled classified data and spying. Plus: Hacking a Corvette via text; Android sandbox bypass flaw; Oracle CSO blogs against reverse-engineering.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close