News
News
- September 04, 2012
04 Sep'12
Data supports need for security awareness training despite naysayers
Claims that security awareness training doesn't work are unsubstantiated, explain software security experts Gary McGraw and Sammy Migues.
- July 11, 2012
11 Jul'12
AWS outage doesn't discourage Netflix
Netflix says it remains bullish on the cloud despite major Amazon outage.
- June 28, 2012
28 Jun'12
Operation High Roller: Online bank fraud
McAfee and Guardian Analytics released the findings of an investigation into a global online bank fraud ring that takes the old techniques up a notch.
-
- June 28, 2012
28 Jun'12
Putting the mobile botnet threat in perspective
While lucrative mobile botnets do exist, Industry experts provide a perspective on seems to be a relatively small mobile botnet threat.
- June 21, 2012
21 Jun'12
Review your security contingency plan during the Games
U.K. companies are preparing to manage their security during the Olympics. Would your security contingency plan hold up to such a disruptive event?
-
Sponsored News
-
Server Security in the Era of ChatGPT
Sponsored by Dell Technologies and Intel - The importance of security and compliance to applications and data environments cannot be overstated. A GenAI platform deployment is different from a typical infrastructure as a service (IaaS) implementation in terms of who holds the keys and who can read the data. Research by TechTarget's Enterprise Strategy Group has found that even cloud-first organizations are deploying some workloads on premises, rather than the cloud, due to concerns related to data governance and sovereignty (cited by 42% of respondents) and security (cited by 34%). These organizations understand the real potential for data leakage associated with GenAI. See More
-
Dell Technologies GenAI-validated Designs and Dell Reference Designs
Sponsored by Dell Technologies and Intel - It's important to have the right infrastructure in place to support generative AI solutions. The intent should be to keep control of both proprietary data and associated GenAI-related business outcomes. See More
-
Sustainability, AI and Dell PowerEdge Servers
Sponsored by Dell Technologies and Intel - When it comes to energy efficiency and sustainability in IT, rightsizing is critical. Optimizing the infrastructure model and the right hardware needed to run it should be the goal. See More
-
A Generative AI Use Case Brought to Life with Solutions from Dell Technologies
Sponsored by Dell Technologies and Intel - Generative AI is not science fiction. It is real. Implementing and using generative AI is a goal within reach of any organization, not just large technology-centric ones. According to research by TechTarget's Enterprise Strategy Group, 92% of organizations will have generative AI in production within the next year. IT vendors such as Dell Technologies are currently working to bring AI to businesses, organizations and institutions in a manner customized to their unique needs. See More
-
- June 01, 2012
01 Jun'12
Stuxnet details should prompt call to action, not words
Security experts have warned of potential problems with military cyberstrikes. Cyberwarfare is difficult to plan and could put civilians at risk.
- May 24, 2012
24 May'12
Technology raises visibility of partner networks
Lookingglass shines a light on the security posture of an enterprise’s partners, clients and third-party providers.
- May 24, 2012
24 May'12
A bold view on prioritizing computer security laws
The number of computer security laws in the U.S. can be daunting. One bold lawyer suggests a way to prioritize the laws and avoid most legal battles.
- May 17, 2012
17 May'12
Maybe security is recession proof; VCs investing again
Venture capital firms are funding security technologies after a quiet period. The investments are a silver lining in a still bleak overall outlook.
- April 27, 2012
27 Apr'12
CISPA threat intelligence bill passes House
The Cyber Intelligence Sharing and Protection Act (CISPA), clears security vendors of any liability for sharing customer attack data with federal officials.
-
- April 11, 2012
11 Apr'12
Azure boosts CSA’s STAR
Cloud Security Alliance transparency effort expands with addition of Windows Azure.
- April 09, 2012
09 Apr'12
Gary McGraw on software security assurance: Build it in, build it right
If the field of computer security is to be fixed, the only hope we have is building security in, says software security expert Gary McGraw.
- April 09, 2012
09 Apr'12
Business and IT security alignment is off
Aligning IT security with business goals is nice, but is it always realistic? Mandates from management often clash with the industry’s ideal characterization of an IT security leader.
- April 04, 2012
04 Apr'12
TIBCO to acquire SIEM vendor LogLogic
TIBCO, an integration software company with little security experience, will purchase one of the few remaining viable standalone SIEM vendors. Terms were not disclosed.
- April 03, 2012
03 Apr'12
Experts say it's time for a mobile security review
There are many mobile device management (MDM) platforms, but they may be unnecessary if you can use the security features native to the devices.
- March 28, 2012
28 Mar'12
Verizon sheds some light on cloud breaches
Verizon says cloud breaches are more about giving up control of assets rather than technology vulnerabilities.
- March 27, 2012
27 Mar'12
Facebook attacks illustrate need for education
Stolen Facebook account credentials could potentially give attackers access to the victim’s corporate network.
- March 26, 2012
26 Mar'12
ISP’s anti-botnet code of conduct accomplishes little
Leading ISPs sign the U.S. Anti-Bot Code of Conduct, which stops short of demanding ISPs provide a clean pipe to customers.
- March 15, 2012
15 Mar'12
NSA mobile security plan could be industry roadmap
Tight controls over the mobile device and the use of VPN tunnels could be employed in enterprise mobile security plans.
- March 02, 2012
02 Mar'12
OpenDNS hires Websense CTO, readies enterprise strategy
DNS provider said it plans a big move into enterprise security market.
- March 01, 2012
01 Mar'12
Dan Kaminsky offers unconventional wisdom on security innovation
Luminary Dan Kaminsky, known for his DNS research, pushed RSA Conference 2012 attendees toward security innovation by upending conventional wisdom.
- January 27, 2012
27 Jan'12
Time to ban dangerous apps? Exploring third-party app security
Column: Third-party applications are notoriously hard to patch and often easy to exploit. Is it time to ban applications, or can they be secured with a new approach?
- January 23, 2012
23 Jan'12
More information security news from SearchSecurity
For all the enterprise information security news that matters, visit our news page on SearchSecurity.
- December 09, 2011
09 Dec'11
Special report: 'Eye On' mobile security
SearchSecurity.com's news team explores the challenges and technologies enterprises must know to successfully manage mobile security.
- May 18, 2010
18 May'10
Should there be PCI security requirements for bank account data?
Gartner analyst wonders why no PCI-like standard exists for bank account information, which online criminals are targeting.
- March 24, 2010
24 Mar'10
Apple iPhone, Microsoft IE 8 get hacked in Pwn2Own contest
Hackers also exploited zero-day vulnerabilities in Apple Safari and Mozilla Firefox browsers in the first day of TippingPoint's Pwn2Own contest Wednesday.
- March 19, 2009
19 Mar'09
How do you align an IT risk assessment with COBIT controls?
[One of our readers, compliance officer Ramon de Bruijn, wrote to the editors of SearchCompliance.com at [email protected] last month looking for some advice. Specifically, he asked "What ...