• September 09, 2014 09 Sep'14

    September 2014 Patch Tuesday includes critical IE security fix

    Microsoft's September 2014 Patch Tuesday features four bulletins, including one critical update for Internet Explorer. Plus: Adobe releases a Flash fix, but delays a planned patch release for Reader and Acrobat.

  • September 09, 2014 09 Sep'14

    Home Depot confirms data breach began in April

    The home improvement retailer confirms its customers' payment card data was breached in an incident that is believed to have begun in April, likely compromising millions of card accounts.

  • September 09, 2014 09 Sep'14

    Home Depot confirms data breach began in April

    The home improvement retailer confirms its customers' payment card data was breached in an incident that is believed to have begun in April, likely compromising millions of card accounts.

  • September 08, 2014 08 Sep'14

    Heartbleed patch efforts ignored on thousands of websites

    Data from McAfee shows many organizations have yet to fully patch the Heartbleed vulnerability, and as many as 300,000 websites remain at risk.

  • September 05, 2014 05 Sep'14

    Goodwill breach highlights need for service provider due diligence

    News roundup: The recent Goodwill security breach has been blamed on a third-party service provider, highlighting the need for due diligence. Plus: Mobile device theft; Android app vulnerabilities and a 12-year-long cyber-espionage network.

  • Sponsored News

    • Is Your Active Directory Cloud Ready?

      Many companies today are considering a move to the cloud. Organizations may believe that a hosted service, such as Office 365, will be easier and or cheaper to maintain than on-prem email. Also, Microsoft and other industry leaders may have influenced a move. Whatever the reason, moving to the cloud isn’t as easy as it appears and results are often mixed if you haven’t adequately prepared your Active Directory. See More

    • Five Top Considerations in Architecting Your Network for the Future

      Network architects have more choices than ever when it comes to data center switches. From emerging categories such as white box switches to new powerful cloud spine switches built on custom chip sets, networks can now be designed with maximum flexibility to address a diverse range of price/performance requirements. See More

    • Examining the Active Directory’s Role in Governance, Risk, and Compliance

      When it comes to governance and compliance, much of the IT staff’s effort is often focused on individual systems. Administrators work meticulously to ensure that mail servers, file servers, database servers, and other resources adhere to both internal security standards and regulatory requirements. The one thing that each of these systems has in common however, is its reliance on Active Directory. First introduced in 2000 as a replacement to the Windows NT domain structure, Active Directory was originally designed to manage network resources. Now, Active Directory works as a centralized authentication and access control mechanism, and consequently plays a vital role in the organization’s overall security. See More

    • FAQ: A Guide to Increasing Automation in Data Center Switching

      By increasing automation in data center networks, IT decision makers can reduce costs and complexity, improve uptime, enhance agility and future-proof their network architectures. The issue is not whether to increase automation, but how to do so most effectively and cost-efficiently. See More

    View All Sponsored News
  • September 04, 2014 04 Sep'14

    Card trail shows Home Depot data breach could be huge

    The reported Home Depot data breach may have affected stores nationwide over the course of several months if new data proves to be correct.

  • September 03, 2014 03 Sep'14

    Apple two-factor authentication fail leaves iCloud users vulnerable

    Apple's decision to not extend its two-factor authentication security mechanism to all iCloud services may leave users more vulnerable to attacks

  • September 02, 2014 02 Sep'14

    Apple and FBI launch iCloud hack investigation

    Apple and FBI investigate the breach of Apple’s iCloud causing fresh business concerns over cloud security

  • August 29, 2014 29 Aug'14

    IDC reports endpoint security market is booming, but isn't antivirus dead?

    News roundup: Endpoint antimalware has been long considered ineffective, yet a recent IDC report projects endpoint security growth. What gives? Plus: AWS Zocalo, new gTLDs, QR code authentication and more.

  • August 28, 2014 28 Aug'14

    Plan ahead to avoid SIEM deployment pitfalls

    Despite SIEM technology improvements, Gartner says many organizations still dive into SIEM deployments without adequate planning, often resulting in disaster.

  • August 28, 2014 28 Aug'14

    PCI SSC issues SIG guidance on maintaining PCI compliance

    The new information supplement offers advice on how to address obstacles in maintaining year-round PCI compliance, even though PCI experts say the challenge is only getting harder.

  • August 25, 2014 25 Aug'14

    Backoff point-of-sale malware hits over 1,000 businesses

    In an advisory Friday, the U.S. government estimated that the Backoff point-of-sale malware campaign has struck over 1,000 businesses to date.

  • August 22, 2014 22 Aug'14

    Community Health breach shows detecting Heartbleed exploits a struggle

    The difficulty of detecting Heartbleed exploits means that the Community Health breach is unlikely to be the last incident linked to the OpenSSL flaw.

  • August 22, 2014 22 Aug'14

    Breaches show information security fundamentals prove hard to learn

    News roundup: Heartbleed vulnerabilities, point-of-sale malware and phishing scams are nothing new, yet numerous companies continue to fall victim to them. Shouldn't the lesson be learned by now? Plus: HTTP Shaming, Dropbox improvements and more.

  • August 21, 2014 21 Aug'14

    Is mobile app data collection a greater threat than mobile malware?

    A vendor report found that while mobile malware may receive more attention, unrestrained mobile app data collection actually poses a greater risk to consumers and data security.