Security methods News
August 01, 2013
Big data presents big challenges for computer science programs from classification to cloud security. Are industry partnerships the answer?
January 27, 2005
Who has the best shot at high-paying jobs requiring security clearances?
Security methods Get Started
Bring yourself up to speed with our introductory content
Uncover key continuous security monitoring tips enterprises can take away from the federal government's Continuous Diagnostics and Mitigation program. Continue Reading
HSPD-7 (Homeland Security Presidential Directive No. 7) was a directive issued by U.S. President George W. Bush in December, 2003 that updated policies intended to protect the country from terrorist attacks. This directive superseded the earlier PDD-63 (Presidential Decision Directive No. 63) issued by President Clinton in May of 1998. Continue Reading
Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise... (Continued) Continue Reading
Evaluate Security methods Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Contextually aware security platforms are growing in importance as employees access corporate assets through more devices and across more locations. Continue Reading
The infections and cyberattacks that botnets are used to launch remain hard-to-detect malware threats that have moved beyond PCs to mobile devices. Continue Reading
Manage Security methods
Learn to apply best practices and optimize your operations.
Security expert Dan Cornell says end-user privacy is a concern for many development teams and gives great advice on how to protect it. Continue Reading
Implementing a defense-in-depth strategy can protect your customers’ Web applications from attack. Take a layered approach with intrusion prevention, encryption and code review. Continue Reading
Problem Solve Security methods Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Expert Michael Cobb compares the value of the SANS Top 20 Critical Security Controls with Australia's Defence Signals Directorate advice. Continue Reading
In light of the attacks on South Korean organizations, expert Nick Lewis defines logic bomb attacks and offers other examples and countermeasures. Continue Reading
Learn how to prevent malcode like the Poison Ivy RAT malware, sophisticated malware that has been crafted especially for an enterprise take-down. Continue Reading