-
Analysis: Surface tablet up for BYOD security challenge
Expert Michael Cobb says the forthcoming Windows tablet security features on Microsoft's Surface could help meet enterprise BYOD challenges.
-
Primer: Software-defined networking security
Matthew Pascucci offers an intro to software-defined networking and explains why SDN security relies on securing the SDN controller at all costs.
-
Cyberattacks double, driving up cost of cybercrime
A study by the Ponemon Institute found that successful cyberattacks rose from 50 attacks on average per week in 2010 to 102 on average per week.
-
Using SIEM for threat monitoring
In this new Security School lesson, Andrew Hutchison covers how SIEM technology makes threat monitoring programs more efficient and effective.
Latest News
-
Developers should look at how they address Web app bugs
When addressing Web application threats and vulnerabilities, security teams need to look out for design flaws, says Mike Shema of Qualys, Inc.
-
Microsoft report documents rising flaw disclosures
The Black Hole attack toolkit is fueling many of the exploits targeting the vulnerabilities, according to Microsoft.
-
Rapid7 acquires Mobilisafe to assess mobile device risk
Mobile risk management vendor Mobilisafe assesses employee smartphones and tablets for platform vulnerabilities.
-
October Patch Tuesday: New RSA key length now in effect
The new requirements for digital certificates kicks in with the October update, which includes one critical bulletin and six important bulletins.
-
Report: Chinese telecom giants influenced by Beijing
A report by the House Intelligence Committee found Chinese telecoms, Huawei and ZTE, pose a significant security threat to the United States.
- Read all the latest news
Email Alerts
Special Report:
-
Readers' Choice Awards 2012
In the 7th annual Readers' Choice Awards, more than 2,000 readers voted to determine the best security products in 14 different categories.
-
Featured winners:
-
E-Guide
Technical guide on PCI DSS guidance
A global perspective on PCI DSS guidance for encryption, tokenization and virtualization technologies.
-
ISM: October 2012
Threat prevention techniques: Best practices for threat management
A successful threat management program requires effective processes, layered technology and user education.
Security Wire Weekly podcast
-
Email attacks still highly successful attack vector
Ali Mesdaq a security researcher at FireEye Inc. explains why malicious file attachments are still a highly successful attack vector for cybercriminals. Automated attack toolkits, spambots and targeted attackers typically use the old standby technique because it works. FireEye has found a spike in maliciou...
-
More blog posts
Exclusive video
The latest interviews, presentations, screencasts and more from SearchSecurity.com. Check out all our videos at SearchSecurity.com/videos.
-
What's hot
Join top security consultant and noted author, Kevin Beaver, CISSP, at an exclusive half day seminar where you will discover proven tactics for addressing critical BYOD security concerns and also earn CPE credit for attending.
Register today! -
DON'T MISS
In this Security School lesson, discover how to effectively deploy antimalware solutions for your enterprise while learning about the pros and cons for each layer of your antimalware architecture.
Attend the Antimalware School today!