Security methods News
August 16, 2016
Fidelis Cybersecurity reports notorious Vawtrak banking Trojan gets upgrades to increase security and evade detection, including SSL pinning and domain generation algorithm.
March 12, 2015
A new Symantec report shows a significant fall in banking malware infections in 2014, but the company warns that malware remains a threat to financial firms.
February 06, 2015
News roundup: With the proposed 2016 federal budget and push for a national data breach law, Washington may finally care about cybersecurity. Plus: Coviello to retire; Flash patched again; Sony Pictures breached by Russians and loses its co-chair.
December 19, 2014
Legally ambiguous active defense strategies are risky -- and costly -- for businesses, but could the benefits outweigh the drawbacks? In this #CIOChat recap, participants highlight the hazards of hacking back.
Security methods Get Started
Bring yourself up to speed with our introductory content
Your Exchange environment is a key component in your organization's communication platform, so shouldn't protecting it get the highest priority? Continue Reading
It's only a matter of time before a hacker infiltrates your system and holds your files hostage. But there are ways to blunt a Windows ransomware assault. Continue Reading
Knowing how to test for security flaws is vital, but it's a complicated and changing field. Expert Kevin Beaver offers security testing basics. Continue Reading
Evaluate Security methods Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
USB Thief, a new type of stealth malware, leaves no trace on air-gapped targets. Expert Nick Lewis explains how the malware works and how enterprises can mitigate attacks. Continue Reading
An unlimited cybersecurity budget may sound like a dream, but in reality it could do more harm than good for an enterprise. Expert Mike O. Villegas explains. Continue Reading
How do vaultless tokenization and standard tokenization differ, and what is the best way to use them for securing cloud data? Expert Dan Sullivan offers guidance and use cases. Continue Reading
Manage Security methods
Learn to apply best practices and optimize your operations.
Organizations need to be aware of the threat of cyberextortion attacks and defend against them. Mike O. Villegas discusses the CISO's role in setting up the defense. Continue Reading
Verizon's 2016 Data Breach Investigations Report found human vulnerabilities and errors continue to be among companies' top data security threats. Continue Reading
Open source log monitoring tools are a budget-friendly way for organizations to increase network visibility and improve incident response times. Continue Reading
Problem Solve Security methods Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The cyberthreat landscape grows more dangerous by the day. Harvey Koeppel offers a 12-point cybersecurity checklist for CIOs. Continue Reading
Getting in the minds of cyberattackers can help organizations mount better defenses against attacks. Here are some ways to accomplish this. Continue Reading
Sometimes the best defense is a good offense. Expert Eric Cole explains the merits of offensive countermeasures in the enterprise. Continue Reading