Assessing and Managing Risk
Threats and Vulnerabilities
The outdated encryption protocol was spotlighted earlier this month when Google researchers released details on the POODLE attack, which preyed on systems that support the SSL 3.0 fallback mechanism.
News roundup: Verizon gave its mobile users an early Halloween trick: a cookie that cannot be erased, despite a number of privacy concerns. Also: compromising an air-gapped computer over the air; an alleged government-funded hack against a CBS reporter and more.
Multifactor authentication technology can be complicated. Expert David Strom explains what enterprises need to know before they invest in an MFA product.
A new study by cloud security startup Elastica shows that enterprise employees are unknowingly leaking sensitive data through cloud apps and services.
The cloud threat-modeling process begins with a fundamental understanding of threat management. Expert Ravila Helen White details these best practices for enterprises.
IaaS clouds need baseline server configuration, but real security requires enterprises to go beyond that. Expert Dave Shackleford reviews some IaaS security best practices.
Dell Software is quietly retiring the KACE K3000 MDM appliance and pushing its other devices, along with a cloud-based mobile management service.
In an effort to entice more enterprise customers, Microsoft beefed up Office 365 with MDM and free unlimited storage.
Amazon Zocalo isn't a game changer for enterprise file sync-and-share, but it gives IT a reputable option to consider from cloud leader AWS.
RSA researchers say the costly Pandemiya banking malware was written entirely from scratch, a dangerous oddity in the world of malware.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.
Smartphone and tablet use in the enterprise can help boost productivity, improve employee satisfaction and lower costs. However, it is also fraught with risk. Expert Lisa Phifer discusses the risks and rewards of going mobile in the enterprise.
Bring your own device has a number of inherent security challenges. Expert Lisa Phifer explains how a mobile device management product can help your enterprise conquer BYOD risks.
Cloud-based data loss prevention can be a worrisome option for some. Kevin Beaver explains how to measure the risk vs. reward of cloud-based DLP.
WordPress is the most attacked web application and websites that run the content management system (CMS) are attacked 24% more often than those using alternative systems.
The Bank of Maharashtra (BOM) is using software from FIS for a card management and card fraud and risk monitoring system as it modernizes its payments platform
Cyber security suffers from a lack of execution, former White House cyber security co-ordinator Howard Schmidt has said.
Talk of IBM reducing its India-based workforce by 50,000 is a reflection of the diminishing importance of low-cost operatives
DataDirect Networks (DDN) announces Amazon S3 gateway device for its Web Object Scaler (WOS) storage platform
Health pilots location-based technology that delivers data visualisation