Pick your battles: cybercriminals are outspending you 11 to 1
Darkweb sales have “all but faded” as exploit brokerages take over, Tenable finds as economic analysis maps the vulnerability-to-exploit ecosystem
David Braue | 10 Dec | Read more
Darkweb sales have “all but faded” as exploit brokerages take over, Tenable finds as economic analysis maps the vulnerability-to-exploit ecosystem
David Braue | 10 Dec | Read more
Reports suggested that China had become the biggest source of Black Friday weekend fraud, even as the Australian Federal Police led a multinational effort to take down a spyware tool that had thousands of paying customers.
David Braue | 09 Dec | Read more
Labor attacks “broken promises” around encryption laws but Melbourne developers report no concerns from overseas customers
David Braue | 06 Dec | Read more
A recent study showed that more than three in four organizations treat API security differently than web app security, indicating API security readiness lags behind other aspects of application security.
Sekhar Sarukkai, McAfee | 05 Dec | Read more
Container-based cloud deployments are growing in popularity due to the ease with which DevOps teams can continuously roll out micro-services and interacting, reusable components as applications.
Sekhar Sarukkai, McAfee | 05 Dec | Read more
At their core, Check Point Integrity and Sygate Enterprise Protection are effectively policy-based firewalls. That's the cake. The icing is their capability to monitor other applications for compliance with configuration requirements and send errant machines to quarantine until they can be updated with the latest anti-virus definitions, Windows patches, or other necessities.
Victor Garza | 28 Dec | Read more
Quantum decryption means the data you encrypt today will be compromised within a decade.
Twelve leading NAC products put to the test
Joel Snyder | 22 Jun | Read more
Bookmarking these sites will help you protect your network, comply with government regulations and stay ahead of all the latest threats.
Jon Brodkin | 08 Apr | Read more
Though most U.S. companies still list customer and other corporate information as their most valuable assets, many keep pushing this data farther from safe lockdown in the data center--and are about to give it another strong shove in that direction.
Kevin Fogarty | 18 May | Read more
Firewall audit tools automate the otherwise all-but-impossible task of analyzing complex and bloated rule sets to verify and demonstrate enterprise access controls and configuration change-management processes.
Neil Roiter | 12 May | Read more
Cell phones, texting, IM, email, Facebook, MySpace--kids are interconnected today in ways hardly imagined two decades ago. But these technology-based communication platforms also enable new forms of an age-old parenting strategy: monitoring your kids. Who are they talking to? What are they talking about? Are they going where they said they are going?
Joan Goodchild | 15 Apr | Read more
The security community has grown to depend on some basic technologies in the fight against cyber thieves, such as antivirus software and firewalls. But are practitioners clinging to tools that outlived their usefulness long ago? Were those tools ever really useful to begin with?
Bill Brenner | 25 Mar | Read more
Biometrics encompasses a variety of methods for ensuring identity based on physical or behavioral traits. Conventional identifying traits include fingerprints, face topology, iris structure, hand geometry, vein structure, voice, signature and keystroke recognition. Emerging technologies analyze characteristics such as gait, odor, and ear shape. Rather than being used in isolation, biometrics systems are increasingly becoming multimodal, an approach that serves both to increase security and overcome failure-to-enroll problems.
Mary Brandel | 25 Mar | Read more
Ten simple tips to manage your enterprise technology.
Julie Bort | 18 Jan | Read more
If you have given your trusted employees and key contractors remote access to your network via a client virtual private network (VPN), congratulations! By now, you have seen the productivity and cost benefits from allowing collaboration that surmounts geographical separation.
Martin Heller | 03 Oct | Read more
There may have been a time when blocking certain sites was acceptable in most office environments. But what was once considered off-limits is now essential in many organizations. Social media sites like Facebook are a major part of many companies' marketing strategy. Sites like YouTube present opportunities to share information about products or services visually. And IM and chat services like G-chat are free and efficient ways for employees to communicate.
Joan Goodchild | 12 Aug | Read more
Ensuring top-level enterprise security has never been more important for the financial services (FS) industry.
Monica Hovsepian, OpenText | 09 Dec | Read more
Modern terrorism and cyberwar are major threats to our society’s way of life.
Craig Ford | 30 Dec | Read more
I don't know about the rest of you, but I seem to spend a bit of time lately in rideshares like Uber, Didi, Ola or any of the other new entrants to the market.
Craig Ford | 17 Dec | Read more
Australia’s Communications Minister recently announced telecommunications companies will be required to adhere to tighter regulations around identity verification for those porting mobile numbers from one provider to another.
Simon Marchand | 03 Dec | Read more
I have some red team/pentest jobs coming up and I was trying to think of how I could get into an organisation with a bit of style while having some fun.
Craig Ford | 03 Dec | Read more