Assessing and Managing Risk
Threats and Vulnerabilities
Microsoft Windows configuration and patch management, Microsoft endpoint security management, Microsoft identity and access management, Microsoft security integration and centralized management, Microsoft security threat management
Developers increasingly rely on a variety of open source components, but a VerSprite researcher warns that security issues accompany many popular frameworks.
The security data breach public response times from Target and Neiman Marcus were noticeably different. Expert Joseph Granneman explains which one works best.
Security controls integrated into the new Apple Pay mobile payment system could strengthen the payment security ecosystem, but unanswered questions remain, like the ramifications of a lost iPhone.
Following FireEye's new threat analytics platform for Amazon Web Services, are enterprises ready to embrace the benefits of cloud-based threat analytics?
Expert Dejan Lukan looks at iSCSI security, the possible attacks on networks using iSCSI and CHAP security.
Calculating and monitoring cloud resiliency is critical to preventing cloud downtime or lessening its effects. Expert Ed Moyle discusses the two main steps to start reducing cloud concerns.
For new members of the workforce, smartphones, tablets and the cloud are a part of life. In some IT departments, however, they're still viewed as disruptive forces. How should today's businesses respond to millennials and technology?
IT departments can benefit from a streamlined PC and mobility management strategy. Technology is still catching up as EMM vendors incorporate PC management.
As the Edward Snowden case shows, there's no such thing as absolute security. That doesn't mean you shouldn't try to secure your network as much as possible.
RSA researchers say the costly Pandemiya banking malware was written entirely from scratch, a dangerous oddity in the world of malware.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.
Security budgets in Australia are soaring as hacking incidents become increasingly common.
Throwing a curve: Is there a potential weakening of security products and services courtesy of the NSA and RSA BSafe?
New survey shows the battle between corporate-issued devices versus personally owned smartphones and tablets is too close to call.
US retailer Home Depot is investigating a possible data breach of customer payment card information that is potentially greater than the Target breach.
In an advisory, the U.S. government estimated that the Backoff point-of-sale malware campaign has struck over 1,000 businesses to date.
At Black Hat, David Litchfield skewered Oracle and its approach to security while detailing several flaws in a new Oracle database security feature.
IBM launches Watson Analytics, a natural language-based cognitive service designed to make predictive analytics easy to use
Microsoft is making its Dynamics CRM 2015 available next quarter along with updates to its Microsoft Dynamics CRM Online services
Retailer Muji is using a cloud-based platform from IT services firm Infosys to help it understand customers and target sales