Latest Resources

IT Security Ebooks

2014 eBook on Encryption

2014 eBook on Encryption

The experts we spoke to for this new ebook agree that when deciding what data must be encrypted, it's a question of classifying it by level of importance.

PCI 2014: From compliance to security

PCI 2014: From compliance to security

The consensus from our panel of experts is that PCI DSS should be just one item on a far broader effort to integrate data security into enterprise risk management.

Social Media Spotlight

Our special Spotlight series is back for the holidays, this time with a fresh focus on social media and its security and privacy ramifications.

Cyber criminals have taken a particular liking to these platforms, given the amount of users who flock there to interact. Plus, sites like Twitter and Facebook form a vast repository for personal or proprietary data, making accidental disclosure or intentional targeting a real concern.


As such, business executives must discern just how to marry business-related social media use with all of the risks that it embodies, and then decide if social networking is friend or foe.


Download the PDF now!

Slideshows

Weekend news review: August 11-15

Weekend news review: August 11-15

For a closer look at these articles, click here to visit our news section.

Weekend news review: August 4-8

Weekend news review: August 4-8

This week's news centers around our coverage of Black Hat in Las Vegas. In one session, a researcher detailed how ...

A look at Black Hat 2014

A look at Black Hat 2014

Black Hat 2014 once again brought in some of the brightest minds in the information security field to showcase their ...

7 talks you don't want to miss at Black Hat 2014

7 talks you don't want to miss at Black Hat 2014

This year's conference hits on various timely issues, including smartcards, the National Security Agency (NSA) and incident response plans.

Weekend news review: July 28-August 1

Weekend news review: July 28-August 1

This week, the Electronic Frontier Foundation (EFF) requested that a court find the National Security Agency (NSA) in violation of ...

Case Studies

Case study: Big LAN on campus

Case study: Big LAN on campus

A university rolled out a wireless network, but was hampered with a user-support problem...until a solution was found. Greg Masters reports.

Case study: Mine games

Case study: Mine games

A website attack prompted an Australia-based mining company to shore up its security implementation, reports Greg Masters.

Network Rx: Health care security

Network Rx: Health care security

With the addition of 15,000 mobile devices accessing its network, a medical center found assurance - and met compliance mandates, reports Greg Masters.

Podcasts

2012 Luminary Podcast: Chris Soghoian

Chris Soghoian, who was recently hired as the ACLU's first-ever principal technologist, has never been afraid to ruffle the feathers of the corporate establishment when it comes to privacy and security issues.

2012 Luminary Podcast: Valerie Aurora and Mary Gardiner

Valerie Aurora and Mary Gardiner have united to form a decade-long collaboration on a variety of "women in open source" advocacy projects, including developing anti-harassment policies at conferences.

Sign up to our newsletters

POLL