Please turn on your JavaScript for this page to function normally.
Key security program and budget data for CISOs

Benchmarking against similar organizations provides IT leaders with powerful tools to analyze departmental performance and gain executive management support. Since no …

The biggest challenge to IT security is marketing

Most companies today are using social media and online marketing channels to tell their customers and prospects about what they do. From company Twitter accounts, LinkedIn …

An introduction to firmware analysis

This talk by Stefan Widmann gives an introduction to firmware analysis: It starts with how to retrieve the binary, e.g. get a plain file from manufacturer, extract it from an …

Week in review: Target breach expands, the security realities of the Internet of Things

Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: How to make malware warnings more effective? An effective security …

Personal info of 70 million Target customers compromised

Target today announced updates on its continuing investigation into the recent data breach. As part of Target’s ongoing forensic investigation, it has been determined …

Fear of data sharing on the rise

U.S. consumer attitudes and behavior related both to data sharing and social media oversharing have shifted significantly just within the last two years, according to a new …

The basics of digital wireless communication

The aim of this talk by Clemens Hopfer from the 30th Chaos Communication Congress is to give an understandable insight into wireless communication, using existing systems as …

Barracuda Networks unveils Backup-as-a-Service

Barracuda Networks announced its new Backup-as-a-Service (BaaS) offering, which allows Barracuda Backup 190 and 390 to be purchased as an annual service that includes an …

Light Patch Tuesday coming up

2014 is getting off to a light start with Microsoft. Only four advisories in the January advance notification. For the first time in a while, there is not a cumulative IE roll …

Key trends for identity and access management

CA Technologies announced its predictions in identity and access management (IAM) and their impact on security professionals in 2014. “We believe that the technology …

What healthcare security and privacy pros wish for

2013 proved to be a dizzying year for healthcare compliance, privacy, and information security: the Affordable Care Act, enforcement of the HIPAA Omnibus Final Rule, and …

The security realities of the Internet of Things

SANS announced results of its 2013 Securing the Internet of Things survey, in which 391 IT professionals answered questions about the current and future security realities of …

Don't miss

Cybersecurity news