The Latest News

  • Logjam Vulnerability: 5 Key Issues

    Don't Rush to Fix 20-Year-Old Flaw, Experts Say Logjam Vulnerability: 5 Key Issues

    While the "Logjam" vulnerability raises serious concerns, there's no need to rush related patches into place, according to several information security experts. Learn the key issues, and how organizations must respond Read more...

  • Application Security: 5 Must-Haves

    OWASP's Soi on Securing the Application Lifecycle Application Security: 5 Must-Haves
    Dhruv Soi, founder Torrid Networks (P) Ltd., and chairperson OWASP India.

    In an application-driven economy, are security leaders paying enough attention to application-level security? OWASP's Dhruv Soi speaks on how to ensure security in the application development lifecycle. Read more...

  • 'Failure-Proof' Mobile Security

    Gartner's Girard on Key Security Challenges in Mobility 'Failure-Proof' Mobile Security
    John Girard, Senior Vice President and Distinguished Analyst, Gartner

    Gartner's John Girard boils down the mobile security challenge to three topics: the number of devices, diversity of capabilities and the complexity of management. How does he advise CISOs to tackle these challenges? Read more...

  • Massive 'Logjam' Flaw Discovered

    Report: NSA Likely Exploited Flaw to Crack VPNs Massive 'Logjam' Flaw Discovered

    Numerous websites, mail servers and other services - including virtual private networks as well as "all modern browsers" - have a 20-year-old flaw that could be exploited by an attacker, computer scientists warn. Read more...

  • Feds Charge Chinese with Insider Theft

    DoJ: Secrets from U.S. Firms Used to Start Up a Chinese Venture Feds Charge Chinese with Insider Theft
    A lab at Skyworks Solutions, where trade secrets were allegedly pilfered.

    Federal authorities have arrested a Chinese professor, accusing him of pilfering trade secrets from the computer systems of American high-tech companies where he and a co-conspirator once worked. Read more...

  • Article

    Dating Website Breach Spills Secrets

    Darknet Dump Offers 3.9 Million Users' Personal Details By Mathew J. Schwartz
    Dating Website Breach Spills Secrets

    One of the world's largest dating websites - self-described "thriving sex community" AdultFriendFinder.com - is investigating reports of a data leak containing details of 3.9 million users' personal details and sexual preferences.

  • Article

    NetUSB Flaw Affects Router Makers

    'Millions' of Devices May Be at Risk, Researchers Warn By Mathew J. Schwartz
    NetUSB Flaw Affects Router Makers

    "Millions" of devices from numerous router manufacturers appear to use a third-party software component called NetUSB, which can be exploited to bypass authentication checks and remotely take control of the devices, security researchers warn.

  • Interview

    Articulating Security's Business Value

    Gartner's Scholtz on How to Educate Management By Varun Haran
    Articulating Security's Business Value

    When security succeeds, it is often unnoticed. That success might also make security investments hard to sustain, given its low profile in organizations. Gartner's Tom Scholtz discusses articulating security's business value.

  • Interview

    The Evolution of Security Technology

    Juniper's Paul on What 'Layered Security' Really Means By Varun Haran
    The Evolution of Security Technology

    As security threats have evolved, organizations have deployed layers of security controls. How can leaders address the vulnerabilities within these incremental controls? Juniper's Paul shares insight.

  • Article

    Questions Over Plane Hacking Report

    Did FBI Conflate Virtual Hacks With Actual Exploits? By Mathew J. Schwartz
    Questions Over Plane Hacking Report

    Did information security expert Chris Roberts exploit vulnerabilities in airplanes' onboard entertainment systems, allowing him to access a plane's thrust management computer and cause it to climb?

More news...

Webinars

  • PREMIUM MEMBER EXCLUSIVE

    Payment Card Fraud Response: Taking on the Processor

    Fraud Summit - Chicago 2014 - In early 2014, First American Bank took the bold step of calling out a payments processor and warning customers not to use payment cards in Chicago-area taxis until a...

  • PREMIUM MEMBER EXCLUSIVE

    Insider Fraud Detection - The Appliance of Science

    Session Preview: See the startling results of meticulous analysis of hundreds of real life insider attacks and learn about new technologies that are able to detect the anomalous behavior patterns...

More webinars...

White Papers

  • Combating Identity Fraud in a Virtual World

    Thanks to the huge proliferation of mobile devices, millions now take their online shopping, banking, socializing and their jobs on the go. But this always-connected lifestyle has come at a steep...

  • Breached How Your Data Can Be Put at Risk

    Breaches like the Target breach of 2013 and the recent "Heartbleed" bug may give you the impression that breaches are just an electronic problem but they aren't. It's impossible for you to...

More whitepapers...
ARTICLE New Approach to DDOS Protection

Attacks are larger, adversaries more diverse, and damage is broader. These are characteristics of...

Latest Tweets and Mentions

ARTICLE New Approach to DDOS Protection

Attacks are larger, adversaries more diverse, and damage is broader. These are characteristics of...

The ISMG Network