security: Application Security

Security ROI: 5 Practices Analyzed
Which security practices bring the best return on investment? Not all of the most popular practices are good for your company.

Unpatched Remote Access Tools: Your Gift To Attackers
Three-year old "TeamSpy" espionage campaign should be a wake-up call. Lock down your remote-access tools, or else.

Password Police Cite Evernote Mistakes
Evernote used the wrong security method to store passwords, cryptography experts say. Unfortunately, it's a common error.

Kill Passwords: Hassle-Free Substitute Wanted
Passwords keep proliferating, but do new technologies and approaches offer an alternative? Maybe.

Security Tools Show Many Dots, Few Patterns
Today's security software wastes valuable time by delivering data dumps, rather than focusing on trends. But you can create your own visualizations.

Don't Blame China For Security Hacks, Blame Yourself
Focus on the sorry state of your information security defenses before worrying about the Chinese, Russians, hacktivists or cybercrime gangs.

Java Security Warnings: Cut Through The Confusion
Recent warnings to deactivate Java are raising additional questions: What about JavaScript, EJB, JavaFX, Android and any other use of the...

Windows 8: A Win For Enterprise Security
Windows 8 makes securing enterprise PCs and tablets easier--and shows that the future of enterprise Windows security is proper control of...

What Huawei, ZTE Must Do To Regain Trust
The U.S. is not the only country scrutinizing the security of Chinese-made telecom equipment from Huawei and ZTE. Without major changes,...

Weaponized Bugs: Time For Digital Arms Control
Thriving trade in zero-day vulnerabilities means dangerous bugs get sold to the highest bidder, and that puts everyone else at risk.
Top Stories
-
Want NSA Attention? Use Encrypted Communications
June 21, 2013Bad news has emerged for fans of PGP and other encryption services. The NSA is taking a gloves-off approach when you go this route.
-
Security ROI: 5 Practices Analyzed
June 19, 2013Which security practices bring the best return on investment? Not all of the most popular practices are good for your company.
-
12 Security Myths That Put Users At Risk
June 11, 2013Security experts weigh in on the dirty dozen misconceptions that make endpoints vulnerable.
-
Zeus Bank Malware Surges On Facebook
June 05, 2013Old threat makes a comeback, targeting Facebook users' bank credentials and more.
-
LinkedIn, Evernote Add Two-Factor Authentication
June 04, 2013Will LinkedIn and Evernote improve upon Apple and Twitter two-factor security systems, which have been widely criticized?
-
Oracle Promises Enterprise Java Security Tweaks
June 03, 2013Critics say Oracle hasn't done enough to address ongoing security and code quality problems in the Java browser plug-in.
-
Liberty Reserve Laundered $6 Billion, Say Feds
May 28, 2013Executives at money-transfer business Liberty Reserve charged with running "bank of choice for the criminal underworld."
-
PC Lockdowns Eyed As IP Theft Tool
May 28, 2013Controversial proposal says businesses should be allowed to lock down PCs they suspect contain stolen information. Privacy expert warns of fraud risk.
-
Microsoft, Adobe Top U.K. Software Piracy List
May 28, 2013Windows, Office, and Photoshop are most commonly pirated apps, according to new study.
-
Google Researcher Reveals Zero-Day Windows Bug
May 24, 2013Bug hunter criticizes Microsoft's "great hostility" to outside security researchers, releases proof-of-concept exploit for unpatched zero-day...
More
News »
Slideshows
Resource Links
Top Story
Europe Weighs New Data Breach Rules For Critical Companies

Mobile networks, banks, energy companies and other critical infrastructure providers could be required to report all breaches to EU authorities.
More News
Related Webcasts
- Smarter Mobile Security: Securing BYOD
- Smarter Mobile Security: Minding the Gaps
- Achieving Unmatched Value and Performance from Oracle's T5 Servers: The Real Story
- Transforming IT Availability: How to provide always-on services at less cost, risk
- Disclosures 2012: The Vulnerability of Publicly Traded Companies
This Week's Issue
Free Print Subscription
SubscribeCurrent Government Issue
- Anytime, Anywhere: Mobile applications are the new way to extend government information and services to on-the-go citizens and employees.
- Big Changes For U.S. Intelligence: New initiative aims to shift the 17-member Intelligence Community from agency-specific IT silos to an enterprise environment of shared systems and services.
- Read the Current Issue