Email Alerts
-
Why advanced malware detection is key to cut through 'network noise'
Video: Wolfgang Kandek, CTO at Qualys, discusses the need for advanced malware detection as true enterprise threats are being lost in "network noise." Video
-
What risk does the Apple UDID security leak pose to iOS users?
Expert Michael Cobb details Apple's Unique Device Identifiers, plus why iOS users should be concerned about the Anonymous UDID security leak. Answer
-
Stolen credentials, basic security lapses at core of 2012 breaches
Social engineering attacks and stolen passwords are giving attackers unfettered access to corporate systems for extended periods of time. News
-
Study finds firms lagging in health care privacy, data security protections
Inadequate security controls, a heavy use of cloud-based services, and employee negligence are resulting in multiple breaches at the same firms. News
-
Phishing attack, stolen credentials sparked South Carolina breach
A phishing attack and stolen credentials gave an attacker access to the systems of the South Carolina Department of Revenue for two months. News
-
Identity fraud rings in the U.S. target wireless companies, banks
A new study by ID Analytics found that more than 10,000 identity fraud rings exist in the U.S., many in the rural Southeast. News
-
NASA to deploy whole-disk encryption following breach
Stolen laptop contained the sensitive data on a large number of employees and contractors. The information was not encrypted. News
-
Adobe investigates scope of customer forum breach
Names, email addresses and encrypted passwords of thousands of customers may have been exposed in a breach of the software maker's customer forum. News
-
offensive security
Offensive security is a proactive and antagonistic approach to protecting computer systems, networks and individuals from attacks. Definition
-
CrowdStrike advocates offensive security, proactive defense approach
Enterprises can disrupt cybercriminals and deter future attacks, explains Dmitri Alperovitch, CTO of CrowdStrike Inc. The approach has its critics. News
Security Management Strategies for the CIO