XML databases

Hacker News

View All News

Hacker Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Hacker Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Hacker

Learn to apply best practices and optimize your operations.

  • Five reasons to invest in ISO 27001 and other security certifications

    Kyle Anixter, PMO manager of IT services at Curvature, discusses the business benefits of ISO 27001 certification that go beyond just data security. Continue Reading

  • Network security infrastructure isn't only for hackers

    Rapidly changing environments, from sprawl to consolidation, increase the challenges of network risk analysis, proper segmentation, and policy and change management. Continue Reading

  • A network segment strategy protects data by design

    Flat networks, and those lacking proper network segment design, allow attackers to turn a beachhead into a wider compromise, changing a minor problem into a really bad day for security managers. Target and other companies had breaches that were infinitely worse because attackers were able to easily move around the network. Yet logical segmentation, such as the widespread use of VLANs, is giving way to credential-based rules and virtual network segment strategies. In this issue of Information Security, we look at what you should be doing to improve your network security infrastructure.

    CISOs and others agree that enterprise encryption has many merits, but they also admit it comes with a number of challenges that need to be addressed if real success is to be achieved. Key management is a primary concern because attackers often have a pretty good idea of where to look. And, as Apple has discovered, encryption does not make you immune from regulatory scrutiny or interference. Enterprise encryption is a powerful tool, but its implementation presents its own set of perils. The content here will help you navigate the technology and regulatory issues.

    We continue our Readers' Top Picks series with a look at SIEM tools. TechTarget polled 510 IT and security professionals at medium-to-large enterprises who told us that they had active SIEM, log management or advanced analytics projects or technology purchases in the next 12 months. We share the shortlist of products and features from readers who indicated plans to invest in SIEM tools.

     Continue Reading

View All Manage

Problem Solve Hacker Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close