Assessing and Managing Risk
Threats and Vulnerabilities
US Reps. Poe and Conyers join Sen. Wyden's fight against changes to Rule 41 that would remove limits on government hacking, introduce companion bill to quash changes.
Researchers demonstrated an exploit that combines rare attacks on memory deduplication and Rowhammer in order to allow an adversary access to read or write system memory.
RSA's Rashmi Knowles spoke with SearchCloudSecurity about enterprises struggling with security visibility, and how analytics and data science can help.
Overlapping security controls for cloud apps and services can be detrimental to enterprises. Expert Rob Shapland explains why that is, and what organizations can do about it.
RSA Security's Rashmi Knowles spoke with SearchCloudSecurity about how new ransomware attacks are targeting cloud service providers and what enterprises can do about it.
Typically a cloud workload doesn't stay in one spot. Expert Dave Shackleford discusses the best ways to secure traveling cloud workloads as they move across environments.
Drive-by financial malware Fobber is the evolution of the popular Tinba -- with better encryption, a newer format and a focus on the Netherlands.
Heimdal Security researchers have found new cases of the nesting-doll financial malware, while Fortinet researchers peel back the layers to reveal its surprising intricacies.
A new Symantec report shows a significant fall in banking malware infections in 2014, but the company warns that malware remains a threat to financial firms.
Smartphone and tablet use in the enterprise can help boost productivity, improve employee satisfaction and lower costs. However, it is also fraught with risk. Expert Lisa Phifer discusses the risks and rewards of going mobile in the enterprise.
Bring your own device has a number of inherent security challenges. Expert Lisa Phifer explains how a mobile device management product can help your enterprise conquer BYOD risks.
Cloud-based data loss prevention can be a worrisome option for some. Kevin Beaver explains how to measure the risk vs. reward of cloud-based DLP.
Detecting fake websites needs to be part of all companies' security strategies, according to security and domain name experts.
WordPress is the most attacked web application and websites that run the content management system (CMS) are attacked 24% more often than those using alternative systems.
Apple has recently come under fire over the security of its customers' data, but the company has done a “nice job” using best practices to secure iTunes backups, according to a security researcher.
Microsoft’s Azure cloud platform has gone well beyond mere virtual machines and orchestrated workflows. It can now also power internet of things applications
Companies should take care of the security vulnerablities in their IT infrastructure, cloud back-ends and mobile applications in preparation for the challenges of IoT, says Adrzej Kawalec
Cyber attacks on banks in Bangladesh, Vietnam and the Philippines used the same malware, which has links to other attacks on banks in the region, reports Symantec