Security threats News
December 22, 2016
Yahoo breach data from 1 billion users was sold to multiple groups on the deep web and questionable breach reporting kept Yahoo from informing users for months.
November 11, 2016
An SEC filing updated what was learned in the investigation into the Yahoo breach in late 2014, but the language in the filing has created more confusion about the incident.
July 21, 2016
A lawsuit against the Department of Justice claims the FBI is using outdated technology in order to avoid fulfilling FOIA requests.
July 08, 2016
Avast purchased competitor AVG to improve consumer and enterprise products, but one expert said the purchase price proves the antivirus market may be on the decline.
Security threats Get Started
Bring yourself up to speed with our introductory content
A memory dump attack is the capture and use of RAM content that was written to a storage drive during an unrecoverable error, which was typically triggered by the attacker. Continue Reading
Calls are growing louder for information security regulations to target consumer-centric technology such as the IoT and drones, but legislating their use could prove difficult. Continue Reading
IT and OT convergence, led by the industrial internet, exposes operational assets to open connectivity and standard protocols. It also opens doors for new threat vectors. Continue Reading
Evaluate Security threats Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Security professionals are playing an ever-greater role in managing business risk. Their efforts against top cybersecurity threats include investing in the latest defensive tools that promise to shut down attackers.
At the top of enterprises' must-have security tool list is global threat-intelligence services. Tools that collect the data that intelligence services use, such as security information and event management (SIEM) systems, also rank high on the list. But having the right tools in place is only the first step. They might potentially provide enterprise security teams with the necessary advanced warnings and valuable insights into security threats against an organization's assets, but these teams must know how to make the most of that information. Putting intelligence feeds to use or exploiting the power of data analytics to further security efforts are not simple tasks. This three-part technical guide offers expert advice on how best to employ threat intelligence and other cutting-edge tools to battle the top cybersecurity threats companies face now. It explains not only what these tools can do but also outlines the pitfalls security pros must avoid for the tools to yield their potential benefits.Continue Reading
In the relatively mature managed print service space, printer security creates a compelling differentiator, experts say. Continue Reading
Finding the best endpoint security for your enterprise is a complex, ever-changing task. Learn what features tools offer now to protect endpoints touching the enterprise systems. Continue Reading
Manage Security threats
Learn to apply best practices and optimize your operations.
In this excerpt from chapter 1 of Information Security Science, author Carl Young discusses information security threats and risk. Continue Reading
Mobile web applications are a convenient way for organizations to offer business apps, but they come with their own set of management issues for IT to tackle. Continue Reading
Modern network security threats aren't getting any easier to address. An analyst works to shed light on the challenges facing current-day IT teams. Continue Reading
Problem Solve Security threats Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In this era of nonstop security threats, incident response tools that help automate detection and reaction are now essential. Learn how to update your IR process. Continue Reading
Expert Chris Tozzi identifies effective strategies and tools for securing each layer of the container software stack. Continue Reading
Malicious or criminal attacks take a longer time to identify and contain, research shows, leading to a higher cost per breach. We look at the numbers. Continue Reading