Security methods

Security methods News

  • March 12, 2015 12 Mar'15

    Banking Trojans decline, but financial malware threat persists

    A new Symantec report shows a significant fall in banking malware infections in 2014, but the company warns that malware remains a threat to financial firms.

  • February 06, 2015 06 Feb'15

    Budget, breach law highlight growing federal cybersecurity awareness

    News roundup: With the proposed 2016 federal budget and push for a national data breach law, Washington may finally care about cybersecurity. Plus: Coviello to retire; Flash patched again; Sony Pictures breached by Russians and loses its co-chair.

  • December 19, 2014 19 Dec'14

    Active defense: The perils of cybervigilantism

    Legally ambiguous active defense strategies are risky -- and costly -- for businesses, but could the benefits outweigh the drawbacks? In this #CIOChat recap, participants highlight the hazards of hacking back.

  • December 17, 2014 17 Dec'14

    The future of active cyberdefense

    Cyberthreats are becoming more advanced, with more companies turning to offensive security tactics to combat them. #GRCChat-ters predict how companies can navigate the unclear waters of active cyberdefense.

View All News

Security methods Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Security methods Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Security methods

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Security methods Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • Can thinking like cyberattackers improve organizations' security?

    Getting in the minds of cyberattackers can help organizations mount better defenses against attacks. Here are some ways to accomplish this. Continue Reading

  • Offensive countermeasures: How they can slow down adversaries

    Sometimes the best defense is a good offense. Expert Eric Cole explains the merits of offensive countermeasures in the enterprise. Continue Reading

  • In denial about DDoS: Defense planning falls short

    Advanced distributed denial-of-service attackers are using a mix of techniques to hit targeted victims in ways all too similar to advanced persistent threats. DDoS defense planning is still lax at many enterprises, but if you do not have mitigation processes in place, it will cost you. Response, brand reputation and opportunity costs quickly add up in major attacks. The primary cost for victims, tied to the length of the outage, is revenue interruption says John Pescatore, director of emerging trends at the SANS Institute. The former Gartner analyst looks at the current denial-of-service landscape and associated costs in his article, “DDoS defense planning falls short.” Adam Rice and James Ringold continue their series on APTs. In their article “Man versus machine data,” the authors outline strategies to implement verbose logging across the enterprise and discuss the promise of big data security analytics to help security professionals track the APT lifecycle. The hard issues around intellectual property protection and the steps enterprises and vendors are taking to address them are also covered this month in Feature Editor Kathleen Richards’ article, “Breaches reignite intellectual property protection.” We also welcome back longtime columnist Marcus Ranum, who starts off the year chatting about metrics with IBM’s Diana Kelley. Security 7 winner Frederick P. Chang, Ph.D., offers his take on what is needed to take cybersecurity education and science to the next level. Continue Reading

View All Problem Solve