Security threats News
February 06, 2015
A new report by HP shows most enterprise security operations centers fail to meet recommended maturity levels needed to detect and manage cybersecurity threats.
January 09, 2015
Experts say the security industry's 'blind trust' may result in a new wave of security threats caused by fake SSL certificates, including man-in-the-middle and DNS attacks.
December 15, 2014
The International Institute for Analytics predicts storytelling, ensemble modeling and the 'Analytics of Things' will be hot in 2015, The Data Mill reports.
December 08, 2014
Mobile computing, geolocation targeting, and sophisticated data collection and analytics tools are building toward increased customer interactions, but determining how to best deliver information to customers is still a work in progress at many enterprises. In this issue of CIO Decisions ezine, we speak with CIOs and experts about multichannel customer engagement strategy and why unscrambling the myriad interaction touch points calls for close collaboration between CIOs and their business peers.
Also in this issue: TechTarget's 2014 IT Salary Survey indicates that high-earning executives are outcompeting their low-earning peers on pay, but not necessarily on happiness; CIO expert Harvey Koeppel reveals the 10 things CIOs can do to prepare for the Internet of Things; and chief data officers from a range of organizations share the important role CIOs played in developing their positions.
Security threats Get Started
Bring yourself up to speed with our introductory content
An evil twin, in security, is a rogue wireless access point that masquerades as a legitimate hot spot. Continue Reading
A hypervisor attack can allow hackers to take control of your VMs. While numerous guest OS and network security vulnerabilities exist in a virtual environment, a successful hypervisor attack could have devastating consequences. Continue Reading
Expert Paul Henry discusses how the draft NIST Special Publication 800-125-A can help enterprises better understand the threat landscape in a virtual realm. Continue Reading
Evaluate Security threats Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert contributor Ed Tittel explains which types of organizations need a threat intelligence service as part of a proactive, layered security strategy. Continue Reading
Expert contributor George V. Hulme explains how wireless intrusion prevention systems (WIPS) protect enterprise networks from attacks and prying eyes. Continue Reading
An API expert discusses the prevalence of API attacks and the need for vetting third-party developers. Continue Reading
Manage Security threats
Learn to apply best practices and optimize your operations.
Habits make or break Exchange security. Follow these six steps every day to create good admin habits and a more secure environment. Continue Reading
It's important to not only take the big issues into consideration but also remember about small problems to keep a secure virtualization environment. Continue Reading
As technology and its accompanying information security threats evolve, keeping employees informed about their data protection duties will be essential. Continue Reading
Problem Solve Security threats Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
After the latest wave of attacks, including the most recent on Sony, network security pros are losing sleep. Can new platforms stop today's network security threats? Continue Reading
Modern companies constantly seek improved data protection, and a great place to start is a reexamination of internal security governance processes. Continue Reading
Apigee chief security architect Subra Kumaraswamy discusses API security best practices. Continue Reading