Click on a filter below to refine your search. Remove filter to broaden your search.
|Last 12 months||remove|
Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.
Companies have amassed an arsenal of security tools to enable a defense-in-depth strategy. Best practices dictate the use of SIEM, VA, encryption, patching, DLP, MDM and other security tools - but this can create silos of controls and data. Given network, device, access and threat dynamics, how can IT be...
Some estimates show that 25 to 35 percent of employees have "inappropriate access" to data, and experts recommend that companies have strong internal controls that assume an insider attack is imminent.
Naoki Hiroshima recently relinquished to an attacker a prized possession that he owned since 2007: a very rare Twitter username so coveted that not only have people tried to steal it, but one person offered $50,000 for it.
Cryptocurrency mining malware has been discovered on DVRs that record footage taken by surveillance cameras.
The categories in this round of finalists include best data leakage prevention solution, risk/policy management solution, Excellence Award for best customer service, Professional Awards for certification program and training program.
Experts discuss the most dangerous new attack techniques, which include point-of-sale malware, mobile and wireless threats, and compromise of industrial control systems.
When defenses improve against DNS amplification and NTP reflection, SNMP may become the next vector for carrying out massive distributed denial-of-service attacks.
AVAST's CEO announced on Sunday that the community forum was hacked over the weekend and roughly 400,000 users had information compromised.
The Prolexic Security Engineering Response Team issued a threat advisory after researchers observed 14 SNMP reflection DDoS campaigns in about a month.
Seven vulnerabilities were addressed in a Thursday OpenSSL update, but experts do not believe that any are as threatening as the Heartbleed bug.
We don't need to make the same mistakes of the first generation of PCs and servers, says the SANS Institute's John Pescatore.
The 2014 SC Awards U.S. have finally come to a close. Here's a look at those who took home a big prize!
Jay Radcliffe showed how his insulin pump was vulnerable to a remote takeover.
Despite testy relations among countries, international cyber security standards offer the promise of cooperation, Alan Earls reports.
The upcoming 2014 SC Awards U.S. in San Francisco will feature some of the most prominent names in the industry. Here's a list of the finalists for the big upcoming event.