• September 09, 2015 09 Sep'15

    IT pros don't get cybersecurity risks around certificate authorities

    A survey of IT professionals at the Black Hat conference shows that understanding of certificate authorities is low, and Venafi believes this could lead to cybersecurity risks.

  • September 08, 2015 08 Sep'15

    September 2015 Patch Tuesday: More critical Microsoft Office fixes

    Microsoft's September 2015 Patch Tuesday is available now and includes five critical bulletins, two of which tackle remote code execution flaws affecting Microsoft Office.

  • September 04, 2015 04 Sep'15

    DOJ Stingray rules require warrant to track mobile phones

    The U.S. Department of Justice announced the establishment of a new policy for cell-site simulator devices that will require law enforcement to obtain warrants in order to track mobile phones.

  • September 03, 2015 03 Sep'15

    OPM breach protection services on the way for 21.5M victims

    The contract for identity theft and credit protection services for OPM breach victims has been awarded, but protection notifications will not be going out to OPM victims until later this month.

  • September 02, 2015 02 Sep'15

    Deception may be next big IT security tool, or may be hype

    A new report claims that deception may become a big factor in the future of IT security tools, but one expert warns that the efficacy of such tactics can diminish with popularity.

  • Sponsored News

    • Optimize Your Journey to Azure AD

      For IT managers under pressure to improve security while streamlining costs and resources, the decision to adopt cloud-based applications such as Office 365 is easy. Unfortunately, the transition from on-premises Active Directory to cloud-based Microsoft Azure Active Directory (Azure AD) or a hybrid solution may not be as easy as it would seem. Even those already operating in the cloud could benefit by optimizing their environments. See More

    • RAND Model Quantifies Staying Power of Security Technologies

      When you estimate the ROI of a new security technology, you usually assume that it will provide the same value year after year. But the RAND Corporation has developed a sophisticated new model of the costs and benefits of cybersecurity which has produced a surprising result. See More

    • When It Comes to Security, Protection and Performance Matter

      Malware is becoming more sophisticated and today it's commonly hidden inside a larger file, or encrypted so a firewall device can't decrypt it. Meanwhile, the price of cyberhacking tools is going down, so denial of service attacks, eavesdropping software, and Wi-Fi interception devices are less expensive and more readily available. See More

    • Top 4 Reasons Why Security and Networking Are Coming Together

      Until recently cybersecurity and networking could be treated as separate domains, with different devices, different management tools and different staffs. But that approach won’t fly today. This paper discusses why security needs to be integrated into networking equipment, monitoring and management. See More

    View All Sponsored News
  • September 01, 2015 01 Sep'15

    Warnings, neglect and a massive OPM breach

    Why no one should have been surprised by the government data hack.

  • September 01, 2015 01 Sep'15

    Chip and PIN migration slow as EMV deadline approaches

    A major deadline for EMV card adoption is just one month away. Can chip-and-PIN and chip-and-signature technology improve payment card security and reduce fraud?

  • August 31, 2015 31 Aug'15

    Qualcomm claims new mobile SoC will feature zero-day detection

    Qualcomm announced that its next flagship chipset will include Smart Protect, a feature designed for machine learning and zero-day detection on mobile devices.

  • August 28, 2015 28 Aug'15

    Tor vulnerabilities make the Dark Web too risky for the black market

    The Dark Web is where many shady deals can happen on the Internet, but Tor vulnerabilities have made it too risky for one of the largest online black markets to stay in business.

  • August 28, 2015 28 Aug'15

    Internet of Things security concerns prompt boost in IoT services

    News roundup: As Internet of Things concerns become an enterprise reality, one vendor is quick to offer IoT services to combat the risks. Plus: 1% of users create 75% of the risk; Target pays up; Apple devices improperly secured in the enterprise.

  • August 28, 2015 28 Aug'15

    Gula talks Nessus agents and Nessus cloud

    Video: SearchSecurity spoke with Tenable co-founder Ron Gula about recent additions to the Nessus feature set, including a version that lives in the cloud.

  • August 27, 2015 27 Aug'15

    Report: phishing training could cut damage costs by $1.8M

    A new report breaks down the potential costs associated with a phishing breach and claims that phishing training could cut those costs by as much as $1.8 million.

  • August 27, 2015 27 Aug'15

    Angler EK and Flash zero-days make malvertising more effective

    Malvertising campaigns are becoming more effective due to the popularity of the Angler EK and its use of Flash zero-day vulnerabilities. And one expert says ad blockers are not the answer.

  • August 27, 2015 27 Aug'15

    CISOs: Application security programs need improvements

    An up-to-date application security program -- as well as knowing how to connect with stakeholders -- is critical to being a successful CISO today, said Renee Guttmann, vice president, Office of the CISO at Accuvant Inc.

  • August 25, 2015 25 Aug'15

    Report says SMB IT still doesn't get virtualization security

    A new report makes controversial claims about the costs of breaches in virtualized environments, strongly suggesting IT pros may not understand the challenges of virtualization security.