Security threats News
June 13, 2016
Symantec's June 2016 announcement that it intends to buy Blue Coat mirrors Trend Micro's acquisition of Tipping Point in 2015. Both moves underline that there is an appetite for integrated ...
May 24, 2016
Former computer science majors Lieu and Hurd wrote to their U.S. House of Representatives colleagues, urging improved awareness of cyber risks and cyberhygiene.
March 09, 2016
Blockchain technology -- perhaps the hottest topic in the financial tech community -- has finally made it on the radar of the U.S. Congress, but it's been a long haul, much more education is needed ...
August 05, 2015
Data science can sort through huge data stores in order to find and stop advanced attackers and malware, but new methods are needed to make sure the machine learning keeps up with evolving threats.
Security threats Get Started
Bring yourself up to speed with our introductory content
IT departments are weighing VDI implementations in healthcare facilities to decrease the security threats associated with user devices, among other reasons. Continue Reading
In the first part of this webcast, Nemertes Research CEO Johna Till Johnson encourages CIOs not to ignore new, sophisticated threats and to plan for next-generation security. Continue Reading
Numerous router security threats have made the news, threatening the integrity of enterprise data. Expert Kevin Beaver offers three steps for maintaining router safety. Continue Reading
Evaluate Security threats Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
URL-shortening services have become a security threat to organizations. Expert Dave Shackleford explains why and how to mitigate the risks of shortened URLs. Continue Reading
Oracle is killing off the Java browser plug-in due to security risks. Expert Michael Cobb explains the next steps for enterprises with Java-based applications. Continue Reading
The latest and greatest in technology opens new opportunities for hackers to penetrate sensitive corporate data. Continue Reading
Manage Security threats
Learn to apply best practices and optimize your operations.
Learn about the 'hacking as a service' and other emerging security threats. Continue Reading
Among the myriad evolving threats to information security, CIOs can count on one constant: Human error. Niel Nickolaisen offers three best practices for dealing with ourselves. Continue Reading
Video: Some new hacking trends have security professionals worried, including Robert "RSnake" Hansen, who notes the speed and motivation of today's attackers. Continue Reading
Problem Solve Security threats Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
This guide looks at the global threats to security in the enterprise and the role a threat intelligence service can play in enterprise defense strategy. It focuses, first, on how hackers are breaking into systems, then zeroes in on threat intelligence services: Do they really work? If you decide a threat intelligence service should be part of your enterprise security strategy, how do you proceed in securing the right one? This three-part technical guide looks at the broad picture -- at where the threats coming from around the globe -- and then looks closely at what can be done to protect the applications at work in your enterprise. Two chapters zero in specifically on global threat intelligence services. Readers will come away with a thorough understanding of what threat intelligence is, what intelligence services provide and how to proceed in making a global threat intelligence part of your security strategy today. Continue Reading
Some companies are trying to head off information security glitches before they sign on the dotted line, with help from security officers. Continue Reading
Qualys CEO Philippe Courtot spoke at RSA Conference 2015 about why security firms need to take a page from Doctors Without Borders. Continue Reading