• September 15, 2016 15 Sep'16

    MySQL vulnerability disclosed, status of patches uncertain

    Oracle's lack of response to security researchers raises more questions after a zero-day MySQL vulnerability was reported, though patches may have already been released.

  • September 15, 2016 15 Sep'16

    Law enforcement hacking declared search under Fourth Amendment

    A new ruling in a Texas court declared law enforcement hacking to be search in the definition of the Fourth Amendment, but experts say further clarification is needed.

  • September 14, 2016 14 Sep'16

    Monthly Windows rollup: Simplification or loss of patching control?

    Microsoft's Patch Tuesday will change drastically in October, and experts disagree whether the new monthly Windows rollup will make patching simpler or more of a hassle.

  • September 13, 2016 13 Sep'16

    September 2016 Patch Tuesday: Browser security takes center stage

    Microsoft's September 2016 Patch Tuesday is what many would consider a standard bulletin release with a major focus on fixes related to web browser security.

  • September 13, 2016 13 Sep'16

    Burr-Feinstein bill still looks to force companies to break encryption

    Revisions to the Burr-Feinstein Compliance with Court Orders Act are allegedly circulating, but there are questions about how close the bill is to being resurrected.

  • Sponsored News

    • The Key to Better DevOps Is in Your Data

      DevOps is a buzzword right now for good reason—it can deliver significant benefits. The 2016 State of DevOps Report, which surveyed 1,400 IT professionals around the world, paints a picture of high-performing IT development organizations: those with multiple code deployments per day and less than one-hour lead time between code fixes and production deployment. See More

    • How to: Protecting Your Data in the Cloud

      Your data is your company’s most valuable asset. Whether that’s system configurations, customer information, intellectual property, email or other communications, you need to put steps in place to protect it and establish processes to recover it in the event of a loss or some other incident. See More

    • Got Containers? You’ll Need a Way to Monitor Them

      The use of containers is growing rapidly. In a June 2016 survey conducted by Cloud Foundry and ClearPath Strategies, 64% of respondents said they plan to mainstream the use of containers in the next year. As the use of containers proliferates, it is essential to address monitoring to improve the performance, usage and troubleshooting of containers. However, effective monitoring requires an analytics-driven approach that not only informs developers and operations of what’s happening, but also offers those teams the ability to dig into their container usage and performance data to gain actionable insight. See More

    • Cloud-Based Disaster Recovery

      Our world has become increasingly complex. In the past, the most likely cause of system downtime was either equipment failure or a power outage. Today, there are new threats to your business operations, including data breaches, ransomware and other malicious activities. See More

    View All Sponsored News
  • September 09, 2016 09 Sep'16

    RSA: No major changes expected following Dell-EMC merger

    Following the Dell-EMC merger, RSA executives expect no significant changes to the business -- although, there will be some product overlap to deal with.

  • September 09, 2016 09 Sep'16

    Google to tweak Chrome browser security in 2017, flag HTTP as insecure

    Google's campaign to encrypt the web continues, as Chrome browser security will flag any sites using HTTP for passwords or payment info as insecure, starting in 2017.

  • September 09, 2016 09 Sep'16

    OPM breach report blames leadership inaction for data loss

    A House committee investigation into the OPM breach said leadership failed to implement the recommended security improvements that could have prevented the attack and data loss.

  • September 08, 2016 08 Sep'16

    Intel Security sale finalized, McAfee brand resurrected

    After completion of the Intel Security sale to private equity firm TPG, the new jointly-held cybersecurity company will resurrect the McAfee brand and net $3.1 billion for Intel.

  • September 07, 2016 07 Sep'16

    Experts split on whether we're in a cyber arms race or open conflict

    While President Obama said we can still defuse a potential cyber arms race, some experts believe we are already in such competition or already past it and in open conflict.

  • September 06, 2016 06 Sep'16

    President Obama urges focus on non-state actors, not cyber arms race

    President Obama said he wants to avoid a cyber-Cold War and urged nations to focus more on the dangers of non-state actors and less on a potential cyber arms race.

  • September 02, 2016 02 Sep'16

    The original hacker, Guccifer, sentenced to 52 months in prison

    Romanian hacker Guccifer, made famous for exposing the misuse of Hillary Clinton's personal email servers, was sentenced to 52 months in prison for unrelated crimes.

  • September 02, 2016 02 Sep'16

    Apple patches Pegasus spyware bugs in OS X, Safari

    Apple patched spyware bugs in OS X and Safari that enabled the 'lawful intercept' Pegasus cyberweapon exploit against iOS because the desktop and mobile OSes shared vulnerable code.

  • September 01, 2016 01 Sep'16

    FBI wants 'adult' conversation about 'going dark' encryption debate

    FBI Director James Comey wants to have an 'adult' conversation on the encryption debate, but many think that means ignoring experts and embracing the 'going dark' argument.

  • August 31, 2016 31 Aug'16

    Windows 10 Anniversary update adds headaches for antivirus vendors

    The antivirus industry has been under fire lately, and Microsoft's Windows 10 Anniversary update has added new troubles for antivirus software vendors.