- July 15, 2014
Video: BeyondTrust's Marc Maiffret explains why simple attacks are often more effective than advanced threats.
- July 11, 2014
Former CSO Paul Howell details the school's Heartbleed response and how he overcame challenges with assessment, patching and communication.
- July 10, 2014
News roundup: Facebook's manipulation of users' news feeds has reignited the data privacy debate regarding how enterprises should manage user data.
- July 08, 2014
Microsoft's July 2014 Patch Tuesday release addressed two dozen flaws in Internet Explorer. Adobe also provided a critical update for Flash.
- July 08, 2014
Following the collapse of an AWS-based cloud hosting provider, experts say enterprises should prioritize use of multifactor authentication.
Sponsored by Dell - Many companies today are considering a move to the cloud. Organizations may believe that a hosted service, such as Office 365, will be easier and or cheaper to maintain than on-prem email. Also, Microsoft and other industry leaders may have influenced a move. Whatever the reason, moving to the cloud isn’t as easy as it appears and results are often mixed if you haven’t adequately prepared your Active Directory. See More
Sponsored by Juniper - Network architects have more choices than ever when it comes to data center switches. From emerging categories such as white box switches to new powerful cloud spine switches built on custom chip sets, networks can now be designed with maximum flexibility to address a diverse range of price/performance requirements. See More
Sponsored by Dell - When it comes to governance and compliance, much of the IT staff’s effort is often focused on individual systems. Administrators work meticulously to ensure that mail servers, file servers, database servers, and other resources adhere to both internal security standards and regulatory requirements. The one thing that each of these systems has in common however, is its reliance on Active Directory. First introduced in 2000 as a replacement to the Windows NT domain structure, Active Directory was originally designed to manage network resources. Now, Active Directory works as a centralized authentication and access control mechanism, and consequently plays a vital role in the organization’s overall security. See More
Sponsored by Juniper - By increasing automation in data center networks, IT decision makers can reduce costs and complexity, improve uptime, enhance agility and future-proof their network architectures. The issue is not whether to increase automation, but how to do so most effectively and cost-efficiently. See More
- July 07, 2014
Though Oracle has confirmed that Windows XP users will not see Java 8 updates for now, security support for Java 7 is still possible.
- July 02, 2014
Heartbleed exposed a number of long-standing issues at OpenSSL, but the open source encryption project has laid out plans to improve the organization.
- July 01, 2014
A new online archive is allowing researchers to anonymously submit and expose cross-site scripting vulnerabilities uncovered across the Web.
- June 30, 2014
A Gartner analyst says SDN security issues abound because of lacking security controls, little interoperability and shaky management features.
- June 27, 2014
A Gartner analyst offers some psychology tips to help security pros get inside users' heads and eliminate bad security behaviors.
- June 26, 2014
Special report: The handling of an OWASP employee's disputed harassment claim has sparked a debate over the group's governance and its future.
- June 25, 2014
NTP amplification had led to several recent massive DDoS attacks. Despite the good news, researchers say many other DDoS techniques remain unfixed.
- June 24, 2014
At its annual security confab, the research giant said enterprises buy too much threat prevention and not enough detection and response technology.
- June 23, 2014
At its annual security event, Gartner talked up Internet of Things security and not being compliance-focused, but both clash with practical concerns.
- June 19, 2014
Update: Following a hack that destroyed much of Code Spaces' AWS EC2 data, cloud app provider One More Cloud reported similar compromises.