Email Alerts
-
Black Hat conference coverage 2009: News, podcasts and videos
The SearchSecurity.com team is live at the 2009 Black Hat conference. Look here for the latest headlines, interviews, podcasts and videos from Caesars Palace in Las Vegas. Special News Coverage
-
Black Hat Las Vegas 2008: News, podcasts and videos
The annual Black Hat conference is never boring. Check out the latest news, podcasts and videos direct from Caesars Palace in Las Vegas. Special News Coverage
-
Quiz: The threat landscape for 2008 -- Protecting your organization against next-generation threats
Take this five-question quiz to evaluate your knowledge of the material presented by expert Lenny Zeltser in this Intrusion Defense School lesson. Quiz
-
Enterprise Security 2008 Learning Guide
What's in store for 2008: VoIP vulnerabilities? Bigger, badder malware? A cyberterrorist strike? SearchSecurity.com's panel of experts make predictions about this year's emerging enterprise security threats. Learning Guide
-
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
In Chapter 11 of Virtual Honeypots: From Botnet Tracking to Intrusion Detection, authors Niels Provos and Thorsten Holz get inside the botnet and reveal some interesting conclusions. Book Chapter
-
Malware: The ever-evolving threat
The first tip in our series, "How to assess and mitigate information security threats, excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems of the book The Shortcut Guide to Protecting Business Internet Usage published by R... Book Chapter
-
Proven Tactics to Repel Emerging Threats
Today's targeted attacks rob organizations of their most valuable resources. These sessions identify ways to protect your business by detailing how to combat evolving cyberattacks, protect against insider threats, safeguard databases and applications... Session Downloads
-
Information Security Decisions Session Downloads
Session Downloads from Information Security Decisions 2006 Conference. Session Downloads
-
Identity and Access Management Security School final quick quiz
SearchSecurity Retention
-
Steal this Computer Book 4.0: Prevent Google hacking
Learn how to prevent Google hacking in this excerpt from Chapter 8: Stalking the Computer of "Steal this Computer Book 4.0," by Wallace Wang. Book Chapter
Security Management Strategies for the CIO