June 2011
-
June 30, 2011
30
Jun'11
application blacklisting
Application blacklisting, sometimes just referred to as blacklisting, is a network administration practice used to prevent the execution of undesirable programs. Such programs include not only those known to contain security threats or ... Continue Reading
-
June 30, 2011
30
Jun'11
Does information security market consolidation mean the end of the line?
Large IT companies are buying up security vendors, but that doesn’t mean there won’t be plenty of room for innovative startups. Continue Reading
-
June 30, 2011
30
Jun'11
PCI virtualization guidance warns of compliance challenges
PCI group outlines challenges in achieving compliance with payment data on virtualized systems. Continue Reading
-
June 30, 2011
30
Jun'11
Turn your computer incident response team into counter-threat operations
Fending off modern computer attacks requires actively hunting down intruders. Continue Reading
-
June 30, 2011
30
Jun'11
Information security market consolidation: A mixed bag
Big tech companies are scooping up security vendors with mixed results. Continue Reading
-
June 30, 2011
30
Jun'11
PCI virtualization SIG analysis: Guidance for the cardholder data environment
The PCI virtualization SIG guidance is in. Get analysis and advice on virtualization in the cardholder data environment from expert Diana Kelley. Continue Reading
-
June 30, 2011
30
Jun'11
Your information security career and the job market: Value of information security skills
Be aware of changing technology and industry trends, and your job prospects will fall in line. Continue Reading
-
June 30, 2011
30
Jun'11
The threat landscape and Web 2.0 technologies
The idea that social media and other Web 2.0 technologies have vastly altered the threat landscape is plain wrong. Continue Reading
-
June 30, 2011
30
Jun'11
Striving for better information security intelligence
Security teams strive to gain visibility from a deluge of security information and put that data to work. Continue Reading
-
June 28, 2011
28
Jun'11
Enterprise mobile security risks prompt revised mobile protection strategy
Cybercriminals will find ways to bypass native security restrictions on smartphones and other devices, says security luminary Winn Schwartau. Continue Reading
-
June 28, 2011
28
Jun'11
Improve mobile malware protection, lower data loss risks by locking down devices
Mobile malware has been minimal, but attackers are developing attacks that target smartphones to gain access to sensitive data, says security luminary Winn Schwartau. Continue Reading
-
June 27, 2011
27
Jun'11
High-profile attacks, inadequate defenses burden IT security programs
Can CISOs turnaround IT security programs to be more proactive? Experts say many programs are frozen in a reactive mode. Continue Reading
-
June 24, 2011
24
Jun'11
RSA SecurID attack, social engineering threat analysis from Gartner's Neil MacDonald
In this video, Gartner Vice President Neil MacDonald discusses the SecurID attack at RSA, APT realities and the growing enterprise social engineering threat. Continue Reading
-
June 24, 2011
24
Jun'11
IE9 security, Apple security issues: Video with Gartner’s Neil MacDonald
In this video, Gartner’s Neil MacDonald discusses patch management, IE9 security, his Windows 8 security wish list and protecting Apple computers. Continue Reading
-
June 23, 2011
23
Jun'11
WhiteHat acquires static code analysis technology
Move to acquire Infrared Security will add static code analysis to WhiteHat’s dynamic vulnerability testing platform. WhiteHat Security has acquired static code analysis technology from Infrared ... Continue Reading
-
June 23, 2011
23
Jun'11
Gartner’s Ramon Krikken on Web application security scanners
In this video, learn how to get the most out of Web application security scanners, and the four key elements for a successful implementation. Continue Reading
-
June 23, 2011
23
Jun'11
Ramon Krikken on tokenization vs. encryption, PCI tokenization
The Gartner IT1 research director discusses tokenization vs. encryption, PCI tokenization to reduce audit scope and lagging tokenization standards. Continue Reading
-
June 23, 2011
23
Jun'11
Top five themes from Gartner Security Summit 2011
Eric B. Parizo discusses the top themes from the 2011 Gartner Security & Risk Management Summit, including the rediscovery of enterprise risk management. Continue Reading
-
June 23, 2011
23
Jun'11
Eye On: CISO Management Issues
SearchSecurity.com's "Eye On" series examines a security topic each month. In June, the series explores cloud contracts, compliance demands, security awareness and risk-based decision making. Continue Reading
-
June 23, 2011
23
Jun'11
WebScarab tutorial: Demonstration of WebScarab proxy functionalities
In this WebScarab tutorial video, get step-by-step advice on how to install and use this free tool, including the WebScarab proxy features, among others. Continue Reading