• March 01, 2016 01 Mar'16

    Yoran: Solve cybersecurity challenges with creativity, encryption

    Amit Yoran kicked off RSAC 2016 by publicly backing strong encryption, denouncing the 'going dark' debate and calling for more creativity in cybersecurity.

  • March 01, 2016 01 Mar'16

    Microsoft sounds the bell for strong encryption, privacy

    Microsoft's top lawyer criticized the U.S. government's efforts to undermine strong encryption, and called on the industry to support and defend the technology.

  • March 01, 2016 01 Mar'16

    Security incident handling: Prepare to find answers

    CISOs work in stressful scenarios. Before you face executives armed with questions about security incident handling, it's time to formulate some of your own.

  • February 26, 2016 26 Feb'16

    Lines drawn in iPhone backdoor case; Apple gets backup

    The public debate surrounding the iPhone backdoor case heats up; Apple and the FBI clarify their messages; and Apple gets legal support from major tech companies.

  • February 26, 2016 26 Feb'16

    Microsoft EMET vulnerability turns tool against itself

    Roundup: Microsoft EMET is vulnerable to exploit; it's time to update to v5.5.Plus; Dell, IBM and Gemalto research reports claim cybercriminals are getting smarter, bigger and faster.

  • Sponsored News

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • Choosing the Right Tools to Harness Big Data

      As the global business environment becomes more complex, IT departments must quickly figure out how to interact with, deliver and analyze the deluge of data from an ever-growing number of sources. For many organizations, harnessing the competitive power of the large data sets stored in their environments—known as big data—is leading the business strategy. See More

    • A Threat Intelligence Service Case Study: The Escelar Trojan

      In this article we explore a case study: How Unit 42, Palo Alto Network’s threat intelligence and research team, used the AutoFocus threat intelligence service to detect and analyze the Escelar banking Trojan. See More

    • Optimize Your Journey to Azure AD

      For IT managers under pressure to improve security while streamlining costs and resources, the decision to adopt cloud-based applications such as Office 365 is easy. Unfortunately, the transition from on-premises Active Directory to cloud-based Microsoft Azure Active Directory (Azure AD) or a hybrid solution may not be as easy as it would seem. Even those already operating in the cloud could benefit by optimizing their environments. See More

    View All Sponsored News
  • February 24, 2016 24 Feb'16

    RSA Conference 2016: An opportunity to take a stand

    The technology industry has allowed the debate over encryption and "going dark" to get out of hand. But it can start to right that wrong at RSA Conference next week.

  • February 19, 2016 19 Feb'16

    PCI DSS 3.2 marks the end of major updates to the standard

    The PCI council has determined its data security standard is finally mature enough to forego significant updates, so PCI DSS 3.2 will be more of an incremental modification.

  • February 19, 2016 19 Feb'16

    DHS posts CISA rules for reporting cyberthreat indicators

    Roundup: DHS posts first pass at guidelines for cyberthreat indicator reporting under CISA. Plus, the U.S. planned a major cyberattack against Iran if nuclear diplomacy had failed, and more news.

  • February 18, 2016 18 Feb'16

    RSA Conference 2016 preview: IoT and encryption take center stage

    The Internet of Things once again dominates the agenda at RSA Conference 2016, but experts say there will be other hot topics, including the growing debate between IT and the government over encryption backdoors.

  • February 18, 2016 18 Feb'16

    Data breach lawsuits indicate a troubling trend for enterprises

    Data breaches are becoming more and more common -- as are class-action lawsuits from affected customers and employees. So, what are the costs of data breach lawsuits?

  • February 17, 2016 17 Feb'16

    Security startups vie for honors in RSA Innovation Sandbox

    The RSA 2016 Innovation Sandbox competition highlights the top security startups, but only one will be awarded title of 'RSA Conference 2016's Most Innovative Startup.'

  • February 17, 2016 17 Feb'16

    Court rules Apple needs iPhone backdoor; Tim Cook opposes

    A court order has ruled that Apple needs to create an iPhone backdoor to unlock the device used by the gunman in the San Bernardino killings, but Tim Cook opposed the ruling.

  • February 16, 2016 16 Feb'16

    Ransomware attack causes internal emergency at Hollywood hospital

    The FBI, along with the LAPD, began investigating a ransomware attack at a Hollywood hospital that has crippled the facility's operations and could cost millions.

  • February 16, 2016 16 Feb'16

    RSA Conference 2016 special coverage: News and analysis

    Find out what's happening in the information security industry with breaking news by the SearchSecurity team at RSA's 2016 conference in San Francisco.

  • February 12, 2016 12 Feb'16

    Study: IT staff pressured to buy useless cybersecurity products

    A new study found that IT managers feel pressured to purchase new cybersecurity products even if they don't have the skills to implement the technology properly.