-
Zenmap tutorial: Mapping networks using Zenmap profiles
Video: In this Zenmap tutorial screencast, Keith Barker of CBT Nuggets explains how to efficiently map networks graphically using Zenmap profiles.
-
Report details South Carolina breach
A phishing attack and stolen credentials gave an attacker access to the systems of the South Carolina Department of Revenue for two months.
-
Book chapter: CISSP All-in-One Exam Guide
This excerpt provides references for government employees and contractors subject to new requirements, and also new CISSP exam practice questions.
-
Developing a cloud SLA: Key security issues
Organizations need to cover key risk areas when writing cloud provider service level agreements.
Latest News
-
IT security job market fraught with impractical desires
Unrealistic HR and hiring manager expectations and a widening security skills gap is challenging CISOs trying to find the right security talent.
-
U.S. CERT warns of new Samsung, Dell printer threat
Hard-coded passwords on some Samsung and Dell printers could enable an attacker to take control of an affected device.
-
Study finds most antivirus products ineffective
Slow updates to signature databases cause some antivirus products to be ineffective against known threats, according to a study by security firm Imperva.
-
Petraeus scandal and email security, e-discovery
Mixing business and personal email accounts has serious drawbacks, as well as consequences on IT teams managing data integrity.
-
DNS attack targets some Go Daddy hosted sites
Weak passwords may be enabling attackers to hack the DNS records of some Go Daddy hosted websites to spread ransomware.
- Read all the latest news
Email Alerts
Special Report:
-
Readers' Choice Awards 2012
In the 7th annual Readers' Choice Awards, more than 2,000 readers voted to determine the best security products in 14 different categories.
-
Featured winners:
-
E-Guide
Technical guide on PCI DSS guidance
A global perspective on PCI DSS guidance for encryption, tokenization and virtualization technologies.
-
ISM: November 2012
Security 7 Award 2012: Seven Outstanding Information Security Pros
Security 7 Award 2012 honors seven outstanding information security pros. Find out who won this year’s Security 7 Award.
Security Wire Weekly podcast
-
Gary McGraw on proactive defense, offensive security
Software security expert Gary McGraw explains that investing in destructive cyberweapons could have dangerous consequences. He is advocating for a proactive defense approach to cybersecurity.
-
More blog posts
Exclusive video
The latest interviews, presentations, screencasts and more from SearchSecurity.com. Check out all our videos at SearchSecurity.com/videos.
-
What's hot
Data Protection Virtual Conference: Aligning Strategy and Technology with Business Objectives
Register today for our highly anticipated virtual conference on November 14th that will help you justify data protection to business leaders, identify a winning data protection strategy, and offer guidance in choosing, deploying and managing the technologies necessary to secure mission-critical data.
Register today! -
DON'T MISS
In this Security School lesson, discover how to effectively deploy antimalware solutions for your enterprise while learning about the pros and cons for each layer of your antimalware architecture.
Attend the Antimalware School today!