Menu
security

security - News, Features, and Slideshows

Most popular

security in pictures

News about security
  • Former Hacking Team developer reportedly in contact with a terrorist group

    An individual who did work for Hacking Team was in contact with hackers working for a terrorist organization, and disgruntled employees -- who deny the charge -- were planning to sell an antidote to the spyware vendor's surveillance software, an Italian newspaper reported Friday.

    Written by Philip Willan01 Aug. 15 04:20
  • Black Hat 2015: Cracking just about anything

    Researchers at the Black Hat 2015 conference next week will show how to crack Internet routing protocols, malware-detecting honeypots, radio-frequency ID gear that gates building access, and more, but also offer tips on how to avoid becoming victims to their new attacks.

    Written by Tim Greene01 Aug. 15 03:03
  • Ad group urges FTC to reject right to be forgotten in US

    The U.S. Federal Trade Commission should reject a privacy group's push to extend the E.U.'s controversial right to be forgotten rules to the U.S. because such regulations would have a "sweeping" negative effect on many U.S. companies, a trade group said.

    Written by Grant Gross01 Aug. 15 01:54
  • 5 steps to respond to a security breach

    It’s not a matter of if you are going to fall victim to a cyber attack, it’s when. So what should you do to minimise the adverse consequences that can arise from a breach?

    Written by Cheng Lim31 July 15 13:50
Tutorials about security
  • How CISOs can create security KPIs and KRIs

    If your information security functions like most, it develops copious amounts of data about the business's security that it delivers on a regular basis. And typically it never gets read.

    Written by Thor Olavsrud26 June 15 03:07
  • Closing the security loop with automated incident response

    This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

    Written by By Cody Cornell, founder and CEO, Swimlane06 June 15 06:51
  • Breach detection: Five fatal flaws and how to avoid them

    IT Security today is not about defending a (non-existent) perimeter, but about protecting the organization's attack surface, which has changed dramatically due to the cloud, mobility, BYOD, and other advances in corporate computing that have caused fundamental shifts in network architecture and operations.

    Written by By Lior Div, Co-founder and CEO, Cybereason06 June 15 00:37
  • How to use Google's new privacy and security tools

    Google stores, manages and sometimes sells an astonishingly large and complex amount of user data. Unfortunately, that digital information isn't always kept secure or private, but Google puts some degree of control in the hands of its users. To offer you a little more control, Google this week rolled out an updated online hub designed to help manage privacy settings, called My Account, as well as a pair of tools that streamline the process of safeguarding user data.

    Written by Matt Kapko03 June 15 02:51
  • Digging Deeper into the Cisco ASA Firewall REST API

    Security orchestration methods and of course SDN is driving the need for programmable interfaces in  security products.  The Cisco ASA Firewall added a REST API back in December with the 9.3(2) code release.  I've asked Mason Harris, from Cisco, to write up a quick how-to primer on the ASA API capabilities.  Thank you Mason for the great information.

    Written by Jamey Heary13 May 15 07:29
Features about security
  • CRM backups or audit trails? Yes, please

    Like nearly any transactional system, usable CRM data backups are tricky because the data is always changing and dependent on coherency across several tables. Ideally, you'd fully quiesce the system and do a full backup every day, or enable the online backup. But with modern cloud systems and 7x24 customer access (via portals or mobile apps), you can't take the system down, and cloud vendors like SFDC don't provide a full backup more often than once a week. The situation with audit trails is different: they may reliably capture all the changes, but you may only be allowed to track a limited number of fields (the default in SFDC is 20 per object).

    Written by David Taber30 July 15 23:54
  • Why you need to care more about DNS

    When you say Domain Name System (DNS), you might think, naturally enough, of domain names and the technical details of running your Internet connection. You might be concerned about denial of service attacks on your website, or someone hijacking and defacing it.

    Written by Mary Branscombe15 July 15 23:57
  • How OPM data breach could have been prevented

    The recently disclosed data breach at the U.S. government's Office of Personnel Management follows a long history of lax security at the agency, according to the inspector general's office.

    Written by Kenneth Corbin14 July 15 00:39
  • Summer travel scam targets your points and miles

    Ah summer: the time for cookouts and fireworks and long days at the beach trying not to check your email. It's also a time to finally use all those airline miles and hotel points you've accumulated to get a free place to stay and free transportation to get there.

    Written by Jen A. Miller10 July 15 01:56
  • How higher education deals with security threats

    Parents have plenty of things to worry about when they send their kids off to college: money, physical safety, their happiness, empty-nest syndrome, their future. Do they now have to worry about identity theft and data security, too?

    Written by Kacy Zurkus09 July 15 00:30

Whitepapers about security

Market Place

Computerworld
ARN
Techworld
CMO