• June 05, 2015 05 Jun'15

    Government data breach puts EINSTEIN defense system under question

    The FBI is investigating a government data breach in which up to 4 million records may have been stolen and China-based hackers are the prime suspects, but the efficacy of the DHS EINSTEIN defense system has been put under question.

  • June 05, 2015 05 Jun'15

    Vulnerability study questions accuracy of CVSS scores

    A new study claims social media may be a useful indicator of vulnerability risk and lead to more accurate CVSS scores and prioritization.

  • June 05, 2015 05 Jun'15

    Facebook, Google, Mozilla raise the bar with new user privacy controls

    News roundup: New settings and options to boost user privacy and security are emerging on major websites, but is it enough?

  • June 05, 2015 05 Jun'15

    McGraw: Software security testing is increasingly automated

    Security software expert Gary McGraw says testing for security flaws must be automated if everything is going to be checked.

  • June 03, 2015 03 Jun'15

    Adversaries never sleep: unknown malware downloaded every 34 seconds

    In its 2015 Security Report, Check Point Software has found adversaries are exploiting the ease of creating unknown malware to boost the chance of a successful attack, and sandboxing adoption may be the best way to mitigate risk.

  • Sponsored News

    • RAND Model Quantifies Staying Power of Security Technologies

      When you estimate the ROI of a new security technology, you usually assume that it will provide the same value year after year. But the RAND Corporation has developed a sophisticated new model of the costs and benefits of cybersecurity which has produced a surprising result. See More

    • Is Your Active Directory Cloud Ready?

      Many companies today are considering a move to the cloud. Organizations may believe that a hosted service, such as Office 365, will be easier and or cheaper to maintain than on-prem email. Also, Microsoft and other industry leaders may have influenced a move. Whatever the reason, moving to the cloud isn’t as easy as it appears and results are often mixed if you haven’t adequately prepared your Active Directory. See More

    • Top 4 Reasons Why Security and Networking Are Coming Together

      Until recently cybersecurity and networking could be treated as separate domains, with different devices, different management tools and different staffs. But that approach won’t fly today. This paper discusses why security needs to be integrated into networking equipment, monitoring and management. See More

    • Examining the Active Directory’s Role in Governance, Risk, and Compliance

      When it comes to governance and compliance, much of the IT staff’s effort is often focused on individual systems. Administrators work meticulously to ensure that mail servers, file servers, database servers, and other resources adhere to both internal security standards and regulatory requirements. The one thing that each of these systems has in common however, is its reliance on Active Directory. First introduced in 2000 as a replacement to the Windows NT domain structure, Active Directory was originally designed to manage network resources. Now, Active Directory works as a centralized authentication and access control mechanism, and consequently plays a vital role in the organization’s overall security. See More

    View All Sponsored News
  • June 03, 2015 03 Jun'15

    Schneier: Weighing the costs of mass surveillance

    Security expert Bruce Schneier says his new book, Data and Goliath, lays out a compelling case against government mass surveillance.

  • June 02, 2015 02 Jun'15

    Insecure mobile cloud backups leave millions of credentials exposed

    Researchers find that insecure implementation of cloud backups by mobile apps may affect hundreds of thousands of apps and leave as many as 56 million credentials exposed.

  • June 02, 2015 02 Jun'15

    Malware analysis beyond the sandbox

    Researchers estimate that 70% of organizations will have implemented virtual servers by the end of 2015, representing a tipping point in enterprises’ adoption of virtualization. Virtual machines (VMs) must be protected from malware like other ...

  • May 29, 2015 29 May'15

    IRS breach shows the importance of PII security

    A breach of the IRS' Internet tax form service "Get Transcript" exposed the personal information and tax filings of thousands of people.

  • May 29, 2015 29 May'15

    Cybersecurity threat discussion (finally) in boardroom

    News roundup: Cybersecurity is finally garnering attention at the boardroom table, but not necessarily for the right reasons. Plus: Ponemon's "Cost of Data Breach"; D-Link vulnerabilities; NitlovePOS; bad bots.

  • May 29, 2015 29 May'15

    Smartphone security threats plague Android and iPhone alike

    As the global smartphone market slows, it's becoming readily apparent that the rise of smartphone security threats isn't slowing -- and no OS is safe.

  • May 28, 2015 28 May'15

    President urges Senate to act on Section 215 question

    With Section 215 of the Patriot Act meeting its demise on June 1, President Obama calls for the Senate to get busy.

  • May 28, 2015 28 May'15

    Cisco Security Services set for 2x product growth in 2015

    Cisco's Bryan Palma discusses Cisco's strategy for security services and talks about the recent Neohapsis acquisition.

  • May 26, 2015 26 May'15

    NetUSB router vulnerability puts devices in jeopardy

    A newly discovered router vulnerability could leave millions of connected devices open to denial-of-service attacks and remote code execution.

  • May 22, 2015 22 May'15

    2015 DDoS attacks on the rise, attackers shift tactics

    News roundup: New research highlights the changing nature of DDoS attack frequency and methodology. Plus: New malware strains double in second half of 2014; two new address bar spoofing vulnerabilities.