Assessing and Managing Risk
Threats and Vulnerabilities
Microsoft Windows configuration and patch management, Microsoft endpoint security management, Microsoft identity and access management, Microsoft security integration and centralized management, Microsoft security threat management
A new appliance claims to provide an invisibility cloak to hide sensitive network traffic from malicious attacks. Is it too good to be true? Network security expert Kevin Beaver discusses the reality of invisibility cloaks.
Developers love reusing code, whether it’s an open source library or a code snippet copied from the Internet. This expert tip looks at the best ways to secure and monitor component-driven software.
In this video, application security expert Michael Cobb discusses open source risks and how revised security policies can standardize development.
Video: Voodoo Security Founder Dave Shackleford details some of the most worrisome cloud security risks, and how to take advantage of cloud security automation.
Amazon EBS encryption is now offered by AWS. Expert Dave Shackleford explains how it works, why companies might struggle with it and whether it brings the industry one step closer to default cloud data encryption.
Amazon Web Services has added multifactor authentication to its WorkSpaces cloud desktop service, the first step in a larger effort to bolster AWS security.
If you're evaluating enterprise tablets, the Surface Pro 3's PC-like form factor and Intel architecture may have some appeal. But you'll have to carefully consider its price tag.
Mobile asset management gives IT new insight into employees' smartphone and tablet usage -- who owns them, their condition and more. It's a strong complement to MDM.
After months of speculation, VMware Workspace Suite brings together VMware's EUC pieces in one place, not long after rival Citrix launched a similar platform.
RSA researchers say the costly Pandemiya banking malware was written entirely from scratch, a dangerous oddity in the world of malware.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.
Security budgets in Australia are soaring as hacking incidents become increasingly common.
Throwing a curve: Is there a potential weakening of security products and services courtesy of the NSA and RSA BSafe?
New survey shows the battle between corporate-issued devices versus personally owned smartphones and tablets is too close to call.
At Black Hat, David Litchfield skewered Oracle and its approach to security while detailing several flaws in a new Oracle database security feature.
Arguably the most important task of any endpoint security system is to protect against malware. However, these products are less effective as attackers develop increasingly novel ways of sidelining device security.
Indian organizations are waking up to the risks that weak security causes as business becomes digitized
Training firm launches National Coding Week for Adults to spread the word that learning to program is not just for the young
The Welsh envoronmental public body adopts Microsoft cloud functionalities including Office 365 and Azure
What is the best way to expand identity and access management to third-party service providers to ensure data security?