Email Alerts
-
Choosing security products: DLP technology
Data loss prevention technology remains critical in preventing data leakage. In this guide, learn what to consider when evaluating DLP products. guide
-
Certain Cisco IOS, IOS XE devices susceptible to brute-force attacks
Cisco has issued a security advisory after Hashcat researchers disclosed a password flaw in IOS and IOS XE devices that enable brute-force attacks. News
-
NIST picks Keccak: How enterprises can prepare for the SHA-3 algorithm
Expert Michael Cobb digs into Keccak, the winner of NIST's SHA-3 algorithm competition, to guide infosec teams on how to prepare for its arrival. Tip
-
Dell acquires Credant Technologies for device encryption
Dell said the addition of Credant bolsters its data protection strategy by adding encryption capabilities for laptops and mobile devices. News
-
NASA to deploy whole-disk encryption following breach
Stolen laptop contained the sensitive data on a large number of employees and contractors. The information was not encrypted. News
-
Regulatory compliance requirements of a cryptographic system
Mike Chapple discusses what to look for in a cryptographic system from a legal and regulatory compliance standpoint. Answer
-
Information security controls for data exfiltration prevention
Enterprises may be amazed to discover how valuable their data is to attackers. Learn five information security controls to prevent data exfiltration. Tip
-
Black Hat 2012: SSL handling weakness leads to remote wipe hack
Researcher Peter Hannay's man-in-the-middle attack exploited an SSL handing flaw to remotely wipe Android and iOS mobile devices via Exchange server. News
-
SSC's new PCI point-to-point encryption guidance outlines testing procedures
New PCI DSS guidance on point-to-point encryption outlines product testing requirements, and urges more merchant-acquirer collaboration. News
-
The switch to HTTPS: Understanding the benefits and limitations
Expert Mike Cobb explains the value and limitations of HTTPS, and why making the switch to HTTPS may be easier than it seems. Answer
Security Management Strategies for the CIO