Patching strategies
Cybercriminals have initiated an arms race by refining the malware manufacturing and development process to systematically bypass defense mechanisms. There are many …
Serious disconnect between security perceptions and reality
There’s a serious disconnect between security perceptions and reality among IT Enterprise security managers, according to McAfee. The 2011 Data Center Security Survey …
Critical vulnerabilities triple in 2011
Adoption of mobile devices such as smartphones and tablets in the enterprise, including the “Bring Your Own Device” approach, which allows personal devices to …
Payment card security compliance remains problematic
Too many businesses are struggling to comply with payment card security standards, putting consumers’ confidential information at risk. According to the Verizon Payment …
10 actions to reduce IT infrastructure and operations costs
As many IT organizations are under intense pressure to continue to implement cost-cutting initiatives, Gartner has identified 10 actions that can reduce IT infrastructure and …
Multi-year study of real-world software security initiatives
The third major release of the “Building Security In Maturity Model” (BSIMM) study continues to add real-world data defining benchmarks for successfully developing …
New Ovum Technology report: Secunia VIM
How do companies operating diverse and wide-ranging systems solve their vulnerability management challenges? Not by using ad hoc tools, according to the new Ovum Technology …
65% of security pros say SIEM is dead
Two-thirds (65 percent) of senior security professionals at Global 5000 and federal organizations say traditional Security Information and Event Management (SIEM) products no …
Desktop virtualization approaching tipping point
Cost reduction, security, manageability and simplifying the migration to Windows 7 are driving organizations to adopt an aggressive deployment approach when it comes to …
Online communities least trusted with personal information
Symantec announced the findings of its inaugural UK Trust Index, which investigates the extent to which the public trust different industries with their personal information. …
Malicious infections enter 99% of enterprise networks
There is a significant gap in today’s enterprise IT defenses, as advanced malware and targeted attacks are easily evading traditional defenses, such as firewalls, …
Most security pros don’t think a breach will happen to them
New findings from a Tenable Network Security study have uncovered an “It Won’t Happen to Me” mentality amongst security professionals. According to the …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics