security: Perimeter Security

5 Items Should Top Obama's Technology Agenda
From infrastructure to tech education, here's what I want to see on the to-do list for the next four years.

10 Lessons From RSA Security Conference
Mobile, social, and cloud computing have changed the security equation.

Global CIO: We Need A Better Breach Disclosure Playbook
Every data breach feels like an ad hoc disclosure exercise. The risks? Heavy-handed government regs and eroding public confidence.

The End Is Near For Paid Antivirus On PCs
The rise of free but "good enough" software spells an end to the days of having to pay for PC antivirus software.

Schwartz On Security: Confused By RSA's Clarification?
While RSA has offered to replace some tokens, many customers still don't know how or why their SecurID tokens may pose a security risk.

Architect Your Databases Against Data Breaches
If you haven't considered data architecture to help protect your data, now is as good a time as any. Your business and even your job may depend on it.

Schwartz On Security: Security Complexity Challenge No. 1
Still, organizations are loathe to cut vendors, fearing higher prices, greater total cost of ownership, and fewer capabilities.

RSA: The Saw Six Of Tradeshows
Predictably scary, RSA offers a glimpse into the latest threats and security challenges. In this sequel, social engineering goes after social...
Top Stories
-
Chinese Hackers Stole U.S. Military Secrets
May 28, 2013"Cyber exploitation" campaign obtained information relating to 29 weapon systems and 21 areas of cutting-edge research.
-
U.S. Cybersecurity Status Weak, Reports Charge
March 07, 2013DOD report says the military is "not prepared" for cyber war, while a White House report says agencies fall short of federal cybersecurity goals.
-
5 Items Should Top Obama's Technology Agenda
November 07, 2012From infrastructure to tech education, here's what I want to see on the to-do list for the next four years.
-
Who Is Hacking U.S. Banks? 8 Facts
October 23, 2012Hackers have labeled the bank website disruptions as grassroots-level reprisal for an anti-Islamic film. But is the Iranian government really...
-
Mobile Biometrics: Your Device Defines You
October 04, 2012Will mobile biometrics be an identity and access management driver in the enterprise?
-
Cloud Services Face Different Security Threats
September 18, 2012Alert Logic study finds that cloud and on-premises customers face about the same number, but different types, of threats.
-
IBM Launches Advanced Threat Detection Appliances
July 31, 2012Security monitoring devices help enterprises reduce risk by controlling the applications, sites, and online services accessed by employees.
-
Strike Back At Hackers? Get A Lawyer
July 27, 2012Don't risk legal troubles. Get advice before taking the offensive against cybercriminals, military security expert says at Black Hat.
-
Evader Tool Shows Holes In Network Perimeter Security
July 25, 2012Unveiled at Black Hat security conference, free testing tool checks for attacks employing so-called advanced evasion techniques.
-
IT Rates IBM's Q1 Labs Top SIEM Performer
July 09, 2012Our IT Pro Ranking Survey evaluates eight SIEM vendors.
More
News »
Slideshows
Resource Links
Top Story
Europe Weighs New Data Breach Rules For Critical Companies

Mobile networks, banks, energy companies and other critical infrastructure providers could be required to report all breaches to EU authorities.
More News
Related Webcasts
This Week's Issue
Free Print Subscription
SubscribeCurrent Government Issue
- Anytime, Anywhere: Mobile applications are the new way to extend government information and services to on-the-go citizens and employees.
- Big Changes For U.S. Intelligence: New initiative aims to shift the 17-member Intelligence Community from agency-specific IT silos to an enterprise environment of shared systems and services.
- Read the Current Issue
Related Whitepapers
- Reality Check: Putting Next Generation Threat Detection to the Test
- 2013 Forrester Mobile Security Predictions
- Why you're still at risk - and what you can do about it
- Continuous monitoring for government agencies
- Achieving a Comprehensive Information Security Strategy Using Certificate-based Network Authentication