Your search for defense-in-depth returned 3162 results.

Sort results:

Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.

Blog Post Defense in depth: Why the Heartbleed bug is a major wake-up call

Defense in depth: Why the Heartbleed bug is a major wake-up call

Beyond a reasonable doubt is that using a defense in depth strategy makes it substantially more difficult for cyber criminals to obtain sensitive information.

News Report provides in-depth look at POS malware used in some of the biggest breaches

Report provides in-depth look at POS malware used in some of the biggest breaches

A Cyphort Labs report provides an in-depth analysis of Backoff, BlackPOS and FrameworkPOS, malware used in some of the biggest breaches.

Product Review MECS Server v1.9.4.2 by Mobile Active Defense

MECS Server v1.9.4.2 by Mobile Active Defense

The MECS (Mobile Enterprise Compliance and Security) server is a centrally managed enterprise-grade solution designed to extend security functions to corporate and personally-owned mobile devices (iOS, Android).

Opinion Playing defense in ranks: Cybersecurity reimagined

Playing defense in ranks: Cybersecurity reimagined

Technological innovation is now increasingly consumer led forcing organizations to adopt faster to serve them or it diffuses into the work environment leaving the traditional IT to play catch-up.

Brief

U.S. and U.K. to team up in cyber defense exercises

The coordinated effort includes a newly formed cyber cell comprised of officials from the NSA, FBI and Britain's GCHQ and MI5.

News U.S. Defense Secretary Carter emphasizes culture change needed to hire fresh tech talent

U.S. Defense Secretary Carter emphasizes culture change needed to hire fresh tech talent

During a speech at Stanford University this past week, U.S. Defense Secretary Ash Carter acknowledged the government's desire to hire young talent for cybersecurity work.

Case Study Forward progress: How the Denver Broncos really play defense

Forward progress: How the Denver Broncos really play defense

Off the field, demand for bandwidth and protection from network threats set the ball in motion for the Denver Broncos. Greg Masters reports.

Review 2014 Industry Innovators: Perimeter defense

2014 Industry Innovators: Perimeter defense

This is another market area that has seen a lot of change over the past few years.

Feature Defense from the top: FISMA

Defense from the top: FISMA

The DHS will gain more control - and federal cybersecurity likely will be improved - when a FISMA update is passed, reports Lee Sustar.

Brief

NEWS ALERT: Hacktivists claim to have accessed files from private U.S.-based defense group

A group identifying itself as CyberBerkut claimed, in an email to SC Magazine, to have gained access to files on the mobile device of a Green Group official.

Brief

Perimeter defense insufficient, security shifting, report says

A report by Ari Kaplan Advisors and sponsored by Nuix found most infosec pros collaborate with data managers.

Slideshow Weekend news review: October 27-31

Weekend news review: October 27-31

Sergei Tsurikov was sentenced to 11 years in prison after he helped steal more than $9 million from a payment processor. This week also yielded research that suggested point-of-sale (POS) malware attacks increased greatly in Q3. Up to 138,00 events could be seen in one day. For...

Brief

Report: Hackers stole data from Israeli defense firms

A report by Brian Krebs detailed the intrusions, which occurred between Oct. 2011 and Aug. 2012.

Slideshow Weekend news review: January 26-30

Weekend news review: January 26-30

This week, the Federal Trade Commission (FTC) expounded on previous comments surrounding the inherent risk in the Internet of Things (IoT) by releasing a detailed report. Also this week, ransomware was documented, for the first time, as dropping trojans and malware on infected users' systems. For a closer look at...

News Cyber defense consortium formed to share 'fresh' malware

Cyber defense consortium formed to share 'fresh' malware

Fortinet and Palo Alto Networks expect to lure other security vendors to join and share intelligence to thwart malware at the network level.

News Study: AV, anti-malware most used controls for APT defense

Study: AV, anti-malware most used controls for APT defense

Ninety-six percent of security pros employed AV and anti-malware solutions to protect data from APT attacks, while protections for mobile entry points fell at the bottom of the list.

News Black Hat:"Saving cyberspace" requires next-level defense focus

Black Hat:"Saving cyberspace" requires next-level defense focus

Speaker Jason Healey warned that the internet can only endure so much abuse before it's irreversibly damaged.

Feature Smart defense: A talk with industry veteran Gene Fredriksen

Smart defense: A talk with industry veteran Gene Fredriksen

Today's CISO must stay ahead of attackers, says Gene Fredriksen, CISO at PSCU. Teri Robinson talks one on one with the industry veteran.

Blog Post

Frequency analysis: an efficient, effective approach to network defense

Cybersecurity teams spend the majority of their time trying to figure out exactly what is happening on their networks. They would be better served trying to focus on how often things happen on their network.

News Yahoo CISO Alex Stamos tweets 'on-demand' password defense

Yahoo CISO Alex Stamos tweets 'on-demand' password defense

Three days after Yahoo announced its new "on-demand" passwords (ODP), the company's CISO Alex Stamos took to Twitter to defend the company's decision and address criticism from the security community.

Page 1 of 159

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US