Latest Resources

IT Security Ebooks

Is SIEM up to the challenge?

Is SIEM up to the challenge?

This latest ebook from SC Magazine paints a lucid picture of today's SIEM capabilities and challenges to help you decide what might be the right implementation for your organization.

The Game is On: Advanced Persistent Threats

The Game is On: Advanced Persistent Threats

APTs give IT teams headaches, because they are extremely stealthy in nature and are almost always aimed at a very specific target. On the other hand, they are designed to remain in the network undetected for extended periods of time, all the while stealing sensitive company data.

Social Media Spotlight

Our special Spotlight series is back for the holidays, this time with a fresh focus on social media and its security and privacy ramifications.

Cyber criminals have taken a particular liking to these platforms, given the amount of users who flock there to interact. Plus, sites like Twitter and Facebook form a vast repository for personal or proprietary data, making accidental disclosure or intentional targeting a real concern.


As such, business executives must discern just how to marry business-related social media use with all of the risks that it embodies, and then decide if social networking is friend or foe.


Download the PDF now!

Slideshows

Reactions to the NSA 'Heartbleed' allegations

Reactions to the NSA 'Heartbleed' allegations

Citing “two people familiar with the matter,” Bloomberg reported on Friday that the National Security Agency (NSA) was aware of ...

9 expert opinions on the 'Heartbleed Bug'

9 expert opinions on the 'Heartbleed Bug'

Considered one of the most significant internet security vulnerabilities to date - affecting websites, emails, direct messages and other communications ...

April 2014 Threat Stats

April 2014 Threat Stats

In our April Threat Stats, we look at the 400,000 samples of mobile malware collected since the end of November, ...

Weekend news review: March 31 - April 4

Weekend news review: March 31 - April 4

This week's news review features stories on the recent class-action suit filed against Target and Trustwave, a study on Advanced ...

Weekend news review: March 24-28

Weekend news review: March 24-28

Another week in information security brings us major news items that involve more Snowden leaks, the president proposing new legislation ...

Case Studies

Network Rx: Health care security

Network Rx: Health care security

With the addition of 15,000 mobile devices accessing its network, a medical center found assurance - and met compliance mandates, reports Greg Masters.

Case study: Easing learning

Case study: Easing learning

Connection issues prompted an educational service in Illinois to find a solution to speed distribution of teaching materials. Greg Masters reports.

Case study: Wire transfer

Case study: Wire transfer

Students in Georgia were given iPads, but a firewall was impeding network connections...until a solution was found, reports Greg Masters.

Podcasts

2012 Luminary Podcast: Chris Soghoian

Chris Soghoian, who was recently hired as the ACLU's first-ever principal technologist, has never been afraid to ruffle the feathers of the corporate establishment when it comes to privacy and security issues.

2012 Luminary Podcast: Valerie Aurora and Mary Gardiner

Valerie Aurora and Mary Gardiner have united to form a decade-long collaboration on a variety of "women in open source" advocacy projects, including developing anti-harassment policies at conferences.

Sign up to our newsletters

POLL