• March 03, 2016 03 Mar'16

    Government encryption backdoor debate is more nuanced at RSAC

    RSAC panelists had a spirited and nuanced debate about government encryption backdoors, and the topic is more difficult to parse than expected.

  • March 02, 2016 02 Mar'16

    Cybercrime trends point to growing sophistication

    Sophos' James Lyne warns that cybercriminals are becoming more effective, thanks to document-based malware and advanced social engineering techniques.

  • March 02, 2016 02 Mar'16

    Bruce Schneier on IBM grabbing him up with Resilient Systems

    Bruce Schneier chats with SearchSecurity during lunch at RSAC about IBM's plans to acquire Resilient Systems to complete their security offering.

  • March 02, 2016 02 Mar'16

    Diffie, Hellman win Turing Award; cryptography research update

    Diffie, Hellman receive Turing Award and experts review cryptography research, Apple vs. FBI, Juniper backdoors, quantum crypto and the future of cryptography.

  • March 01, 2016 01 Mar'16

    Incident response procedures speed discovery-response time

    Many companies become aware of a security event but take hours or days to perform triage and finally remediate it. Incident response procedures can vary based on the organization, and the type of security incident, which could involve DDoS attacks, ...

  • Sponsored News

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • Choosing the Right Tools to Harness Big Data

      As the global business environment becomes more complex, IT departments must quickly figure out how to interact with, deliver and analyze the deluge of data from an ever-growing number of sources. For many organizations, harnessing the competitive power of the large data sets stored in their environments—known as big data—is leading the business strategy. See More

    • A Threat Intelligence Service Case Study: The Escelar Trojan

      In this article we explore a case study: How Unit 42, Palo Alto Network’s threat intelligence and research team, used the AutoFocus threat intelligence service to detect and analyze the Escelar banking Trojan. See More

    • Optimize Your Journey to Azure AD

      For IT managers under pressure to improve security while streamlining costs and resources, the decision to adopt cloud-based applications such as Office 365 is easy. Unfortunately, the transition from on-premises Active Directory to cloud-based Microsoft Azure Active Directory (Azure AD) or a hybrid solution may not be as easy as it would seem. Even those already operating in the cloud could benefit by optimizing their environments. See More

    View All Sponsored News
  • March 01, 2016 01 Mar'16

    Yoran: Solve cybersecurity challenges with creativity, encryption

    Amit Yoran kicked off RSAC 2016 by publicly backing strong encryption, denouncing the 'going dark' debate and calling for more creativity in cybersecurity.

  • March 01, 2016 01 Mar'16

    Microsoft sounds the bell for strong encryption, privacy

    Microsoft's top lawyer criticized the U.S. government's efforts to undermine strong encryption, and called on the industry to support and defend the technology.

  • March 01, 2016 01 Mar'16

    Security incident handling: Prepare to find answers

    CISOs work in stressful scenarios. Before you face executives armed with questions about security incident handling, it's time to formulate some of your own.

  • February 26, 2016 26 Feb'16

    Lines drawn in iPhone backdoor case; Apple gets backup

    The public debate surrounding the iPhone backdoor case heats up; Apple and the FBI clarify their messages; and Apple gets legal support from major tech companies.

  • February 26, 2016 26 Feb'16

    Microsoft EMET vulnerability turns tool against itself

    Roundup: Microsoft EMET is vulnerable to exploit; it's time to update to v5.5.Plus; Dell, IBM and Gemalto research reports claim cybercriminals are getting smarter, bigger and faster.

  • February 24, 2016 24 Feb'16

    RSA Conference 2016: An opportunity to take a stand

    The technology industry has allowed the debate over encryption and "going dark" to get out of hand. But it can start to right that wrong at RSA Conference next week.

  • February 19, 2016 19 Feb'16

    PCI DSS 3.2 marks the end of major updates to the standard

    The PCI council has determined its data security standard is finally mature enough to forego significant updates, so PCI DSS 3.2 will be more of an incremental modification.

  • February 19, 2016 19 Feb'16

    DHS posts CISA rules for reporting cyberthreat indicators

    Roundup: DHS posts first pass at guidelines for cyberthreat indicator reporting under CISA. Plus, the U.S. planned a major cyberattack against Iran if nuclear diplomacy had failed, and more news.

  • February 18, 2016 18 Feb'16

    RSA Conference 2016 preview: IoT and encryption take center stage

    The Internet of Things once again dominates the agenda at RSA Conference 2016, but experts say there will be other hot topics, including the growing debate between IT and the government over encryption backdoors.

  • February 18, 2016 18 Feb'16

    Data breach lawsuits indicate a troubling trend for enterprises

    Data breaches are becoming more and more common -- as are class-action lawsuits from affected customers and employees. So, what are the costs of data breach lawsuits?