News

News

  • April 13, 2015 13 Apr'15

    Cybersecurity risks masked by controversial vulnerability counts

    Experts have split opinions regarding the correct methodology for counting vulnerabilities, but all agree that focusing on numbers can mask real cybersecurity risks.

  • April 10, 2015 10 Apr'15

    Ways to secure Web apps: WAFs, RASP and more

    Protecting a Web application increasingly means tuning your protections to the individual characteristics of your applications. There’s more than one way to go about this, though. In this three-part guide we review best practices for taking your Web...

  • April 10, 2015 10 Apr'15

    Chrome security under fire from third-party extension

    Security researchers say Webpage Screenshot, a popular third-party extension for Google Chrome, was secretly collecting end-user browsing data. Its true purpose and how Google missed it remain up for debate.

  • April 10, 2015 10 Apr'15

    Tech, security M&A activity booms thanks to mobile, cloud

    News roundup: Technology and security acquisitions have seen some healthy activity in 2015, driven by two key trends. Plus: 75% of users aren't vulnerable to Heartbleed?; White House hack tied to phishing; first state digital ID law.

  • April 09, 2015 09 Apr'15

    SANS: Enterprises overconfident in ability to detect insider threats

    Enterprises may be increasingly aware of insider threats and believe they can find and stop them, but a new SANS Institute survey suggests they may be overconfident and lack the necessary insider threat-detection technology.

  • Sponsored News

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • Choosing the Right Tools to Harness Big Data

      As the global business environment becomes more complex, IT departments must quickly figure out how to interact with, deliver and analyze the deluge of data from an ever-growing number of sources. For many organizations, harnessing the competitive power of the large data sets stored in their environments—known as big data—is leading the business strategy. See More

    • A Threat Intelligence Service Case Study: The Escelar Trojan

      In this article we explore a case study: How Unit 42, Palo Alto Network’s threat intelligence and research team, used the AutoFocus threat intelligence service to detect and analyze the Escelar banking Trojan. See More

    • Optimize Your Journey to Azure AD

      For IT managers under pressure to improve security while streamlining costs and resources, the decision to adopt cloud-based applications such as Office 365 is easy. Unfortunately, the transition from on-premises Active Directory to cloud-based Microsoft Azure Active Directory (Azure AD) or a hybrid solution may not be as easy as it would seem. Even those already operating in the cloud could benefit by optimizing their environments. See More

    View All Sponsored News
  • April 08, 2015 08 Apr'15

    Experts disagree on growth, complexity of cybersecurity threats

    The Websense 2015 Threat Report claims that cybersecurity threats are getting more complex, but one expert says the trends aren't anything new.

  • April 08, 2015 08 Apr'15

    Dyre malware returns to rob banks of millions

    Financial malware Dyre, in tandem with social engineering, was used in a new campaign to steal millions from financial institutions, according to IBM researchers.

  • April 06, 2015 06 Apr'15

    In first Android Security Report, Google cites drop in Android malware

    Google's first Android Security Report claims that malware on the platform was found on fewer than 1% of devices in 2014, but experts question if the ecosystem is really as safe as it has ever been.

  • April 05, 2015 05 Apr'15

    Amid SSL security issues, enterprises face many problems, few answers

    Experts say even enterprises that carefully secure TLS may still be at the mercy of the numerous security issues affecting the SSL ecosystem.

  • April 03, 2015 03 Apr'15

    The transaction that lasts forever

    Whether or not you think Bitcoin has a future, it has a couple of very interesting technological elements that will probably have a life of their own. The aspect that everyone talks about is that ...

  • April 03, 2015 03 Apr'15

    U.S. cyberattacker sanctions program causes stir on social media

    News roundup: President Obama's executive order allowing sanctions on cyberattackers has been met with mixed reaction. Plus: Threat intelligence perception versus reality; healthcare breach consequences; Verizon tosses supercookie.

  • April 02, 2015 02 Apr'15

    Massive GitHub DDoS attack tied to Chinese government

    Security experts say the largest DDoS attack in GitHub history, which lasted five days, was the work of the Chinese government.

  • April 02, 2015 02 Apr'15

    Obama threatens foreign cyber attackers with sanctions

    US president Barack Obama has signed an executive order establishing a framework for the US to impose sanctions on foreign cyber attackers

  • April 01, 2015 01 Apr'15

    NSA’s big data security analytics reaches the enterprise with Sqrrl

    Competition for Hadoop-based analytics may put tools and services within reach for large and midsize organizations, says Robert Richardson.

  • April 01, 2015 01 Apr'15

    Information security jobs unfilled as labor pains grow

    Why cybersecurity hiring is the real cyberwar.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close