NSA PRISM News
May 20, 2015
A newly discovered TLS vulnerability that affects thousands of websites, servers and browser users could allow attackers to bypass encryption.
February 10, 2015
Box will give enterprise cloud data storage customers the ability to control and store their own encryption keys through its new Enterprise Key Management service.
January 26, 2015
Edward Snowden and Bruce Schneier talk data encryption and privacy in a networked world. The Data Mill reports.
August 15, 2014
CIOs battle their own privacy demons as SpiderOak and other vendors attempt to protect customer data from NSA snooping. Also in Searchlight: Cisco cuts 6,000 jobs and the Internet could grow too large for its gear.
NSA PRISM Get Started
Bring yourself up to speed with our introductory content
Graph databases play six degrees of separation to find real connections. See how IT teams can use the database approach for businesses. Continue Reading
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above and beyond compliance requirements. Global threat intelligence services have continued to evolve and play more of role in security information and event management and endpoint security products. More organizations are collecting and analyzing global threat information against vulnerabilities in their IT infrastructure and other assets. We evaluate the value of these services in risk assessment and find out how to take advantage of endpoint intelligence. We also report on the growing trend of community-based threat intelligence services, and look at the puppet masters of malware, command-and-control networks. Columnist Marcus Ranum interviews Avi Rubin about his latest work on shielding medical information systems. Continue Reading
Evaluate NSA PRISM Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
User and vendor concerns after the Snowden NSA revelations may bring increased efforts to shore up UC security in unified communications environments. Continue Reading
The NSA's top-secret Tailored Access Operations offensive hacking unit offers enterprise defense strategy lessons. Expert Nick Lewis discusses. Continue Reading
NSA data collection, metadata as surveillance and code names: The Data Mill reports. Continue Reading
Manage NSA PRISM
Learn to apply best practices and optimize your operations.
The NSA's Information Assurance Directorate released a report on malware defense. Uncover which guidance and best practices would be fruitful to integrate into your enterprise security plan. Continue Reading
Is Apple iMessage encryption strong enough to mitigate reverse-engineering attacks? Learn more about one of the top iMessage security risks. Continue Reading
In this SearchCIO video, security expert Pauline Neville-Jones discusses why mapping IT infrastructure is needed to improve cybersecurity. Continue Reading