• June 09, 2015 09 Jun'15

    June 2015 Patch Tuesday brings critical IE security fix, Flash update

    Microsoft's June 2015 Patch Tuesday features eight bulletins, including a critical update for Internet Explorer and Windows Media Player. Plus: Adobe releases fix for 13 Flash vulnerabilities.

  • June 05, 2015 05 Jun'15

    Government data breach puts EINSTEIN defense system under question

    The FBI is investigating a government data breach in which up to 4 million records may have been stolen and China-based hackers are the prime suspects, but the efficacy of the DHS EINSTEIN defense system has been put under question.

  • June 05, 2015 05 Jun'15

    Vulnerability study questions accuracy of CVSS scores

    A new study claims social media may be a useful indicator of vulnerability risk and lead to more accurate CVSS scores and prioritization.

  • June 05, 2015 05 Jun'15

    Facebook, Google, Mozilla raise the bar with new user privacy controls

    News roundup: New settings and options to boost user privacy and security are emerging on major websites, but is it enough?

  • June 05, 2015 05 Jun'15

    McGraw: Software security testing is increasingly automated

    Security software expert Gary McGraw says testing for security flaws must be automated if everything is going to be checked.

  • Sponsored News

    • Is Your Active Directory Cloud Ready?

      Many companies today are considering a move to the cloud. Organizations may believe that a hosted service, such as Office 365, will be easier and or cheaper to maintain than on-prem email. Also, Microsoft and other industry leaders may have influenced a move. Whatever the reason, moving to the cloud isn’t as easy as it appears and results are often mixed if you haven’t adequately prepared your Active Directory. See More

    • Five Top Considerations in Architecting Your Network for the Future

      Network architects have more choices than ever when it comes to data center switches. From emerging categories such as white box switches to new powerful cloud spine switches built on custom chip sets, networks can now be designed with maximum flexibility to address a diverse range of price/performance requirements. See More

    • Examining the Active Directory’s Role in Governance, Risk, and Compliance

      When it comes to governance and compliance, much of the IT staff’s effort is often focused on individual systems. Administrators work meticulously to ensure that mail servers, file servers, database servers, and other resources adhere to both internal security standards and regulatory requirements. The one thing that each of these systems has in common however, is its reliance on Active Directory. First introduced in 2000 as a replacement to the Windows NT domain structure, Active Directory was originally designed to manage network resources. Now, Active Directory works as a centralized authentication and access control mechanism, and consequently plays a vital role in the organization’s overall security. See More

    • FAQ: A Guide to Increasing Automation in Data Center Switching

      By increasing automation in data center networks, IT decision makers can reduce costs and complexity, improve uptime, enhance agility and future-proof their network architectures. The issue is not whether to increase automation, but how to do so most effectively and cost-efficiently. See More

    View All Sponsored News
  • June 03, 2015 03 Jun'15

    Adversaries never sleep: unknown malware downloaded every 34 seconds

    In its 2015 Security Report, Check Point Software has found adversaries are exploiting the ease of creating unknown malware to boost the chance of a successful attack, and sandboxing adoption may be the best way to mitigate risk.

  • June 03, 2015 03 Jun'15

    Schneier: Weighing the costs of mass surveillance

    Security expert Bruce Schneier says his new book, Data and Goliath, lays out a compelling case against government mass surveillance.

  • June 02, 2015 02 Jun'15

    Insecure mobile cloud backups leave millions of credentials exposed

    Researchers find that insecure implementation of cloud backups by mobile apps may affect hundreds of thousands of apps and leave as many as 56 million credentials exposed.

  • June 02, 2015 02 Jun'15

    Malware analysis beyond the sandbox

    Researchers estimate that 70% of organizations will have implemented virtual servers by the end of 2015, representing a tipping point in enterprises’ adoption of virtualization. Virtual machines (VMs) must be protected from malware like other ...

  • May 29, 2015 29 May'15

    IRS breach shows the importance of PII security

    A breach of the IRS' Internet tax form service "Get Transcript" exposed the personal information and tax filings of thousands of people.

  • May 29, 2015 29 May'15

    Cybersecurity threat discussion (finally) in boardroom

    News roundup: Cybersecurity is finally garnering attention at the boardroom table, but not necessarily for the right reasons. Plus: Ponemon's "Cost of Data Breach"; D-Link vulnerabilities; NitlovePOS; bad bots.

  • May 29, 2015 29 May'15

    Smartphone security threats plague Android and iPhone alike

    As the global smartphone market slows, it's becoming readily apparent that the rise of smartphone security threats isn't slowing -- and no OS is safe.

  • May 28, 2015 28 May'15

    President urges Senate to act on Section 215 question

    With Section 215 of the Patriot Act meeting its demise on June 1, President Obama calls for the Senate to get busy.

  • May 28, 2015 28 May'15

    Cisco Security Services set for 2x product growth in 2015

    Cisco's Bryan Palma discusses Cisco's strategy for security services and talks about the recent Neohapsis acquisition.

  • May 26, 2015 26 May'15

    NetUSB router vulnerability puts devices in jeopardy

    A newly discovered router vulnerability could leave millions of connected devices open to denial-of-service attacks and remote code execution.