• May 01, 2015 01 May'15

    Subscription model for SSL certificates could be easier and cheaper

    A Utah-based startup hopes to change the way enterprises buy SSL certificates to a subscription model, and one expert thinks it could work as long as enterprises can trust the security.

  • May 01, 2015 01 May'15

    Government cybersecurity flounders as cybersecurity bills pass House

    News roundup: Many believe the government should help avert cybersecurity woes, yet two House-approved cybersecurity bills are frowned upon. Plus: DDoS increase linked to IoT; Google password alert; 70% put networks at risk with undocumented changes.

  • April 30, 2015 30 Apr'15

    How WestJet Airlines nixed network complexity, boosted security

    At an RSA Conference session, attendees learned how WestJet Airlines' Security Architecture Made Simple with software-defined security and automation reduced network turbulence.

  • April 30, 2015 30 Apr'15

    Government agencies struggling with security data analytics

    Security data analytics are a must-have for government agencies to stay one step ahead of cyber attackers, according to a study conducted by MeriTalk.

  • April 29, 2015 29 Apr'15

    Port monitoring critical to detecting, mitigating attacks using SSL

    As SSL traffic increases, so inevitably will the number of attacks using it to hide. A session at RSA Conference 2015 explained why hackers love SSL, and how enterprises can defend against them.

  • Sponsored News

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • Choosing the Right Tools to Harness Big Data

      As the global business environment becomes more complex, IT departments must quickly figure out how to interact with, deliver and analyze the deluge of data from an ever-growing number of sources. For many organizations, harnessing the competitive power of the large data sets stored in their environments—known as big data—is leading the business strategy. See More

    • A Threat Intelligence Service Case Study: The Escelar Trojan

      In this article we explore a case study: How Unit 42, Palo Alto Network’s threat intelligence and research team, used the AutoFocus threat intelligence service to detect and analyze the Escelar banking Trojan. See More

    • Optimize Your Journey to Azure AD

      For IT managers under pressure to improve security while streamlining costs and resources, the decision to adopt cloud-based applications such as Office 365 is easy. Unfortunately, the transition from on-premises Active Directory to cloud-based Microsoft Azure Active Directory (Azure AD) or a hybrid solution may not be as easy as it would seem. Even those already operating in the cloud could benefit by optimizing their environments. See More

    View All Sponsored News
  • April 29, 2015 29 Apr'15

    Secunia: End-of-life software posing a big security risk

    Secunia's quarterly Personal Software Inspector (PSI) report shows that while OS and application patching has remained steady, users may be ignoring end-of-life software and the risks associated with it.

  • April 29, 2015 29 Apr'15

    IT security and compliance: Get leadership on board to find balance

    At an RSA Conference 2015 session, finance information security officer Steve Winterfeld explained why having complementary IT security and compliance strategies requires leadership buy-in and cooperation.

  • April 29, 2015 29 Apr'15

    RSA Conference 2015 recap: Record attendance, record stakes

    This year's RSA Conference once again broke the previous year's attendance record. Is the show getting too big for San Francisco? Plus key takeaways and final words from our executive editor.

  • April 28, 2015 28 Apr'15

    Comparing the top SSL VPN products

    Expert Karen Scarfone examines the top SSL VPN products available today to help enterprises determine which option is the best fit for them.

  • April 28, 2015 28 Apr'15

    Open source threat model aims to make enterprise safer with less work

    An open source threat model is aiming to be a repository for risk assessment with the aim of allowing enterprise to focus on creating the right security controls for each business.

  • April 28, 2015 28 Apr'15

    Despite benefits, skepticism surrounds bug bounty programs

    Some people think bug bounty programs are the answers to vulnerability woes, yet others remain skeptical of the negative impacts they present. RSA Conference panelists discussed both sides of one of today's hottest and most controversial IT topics.

  • April 28, 2015 28 Apr'15

    Insider threat programs need people, not technology

    A panel discussion at RSA Conference 2015 outlined strategic methods enterprises can use to build and advocate for an insider threat program.

  • April 27, 2015 27 Apr'15

    DevOps explained: Why experts call DevOps and security a perfect match

    At RSA Conference 2015, a pair of DevOps proponents explained why the nascent movement to integrate development and IT operations staff pays security dividends.

  • April 27, 2015 27 Apr'15

    New study shows enterprise security confidence high but defenses low

    A new study from network security firm Fortinet shows that enterprise security confidence levels are high despite a lack of comprehensive security measures.

  • April 27, 2015 27 Apr'15

    WordPress vulnerable to stored XSS bug, researchers find

    A researcher has released a proof-of-concept exploit for a WordPress vulnerability leveraging stored XSS, which could lead to remote code execution on affected servers.