The sky is falling! Hackers target satellites

April 22, 2014
IOActive reports finds serious risks -- and slim prospects for fixes -- in satellite communications
Read more »

The right way to secure the Internet of things

April 15, 2014
Security products and practices will be reinvented to protect the Internet of things, but the real solution centers on a simple idea
Read more »

The Heartbleed OpenSSL flaw is worse than you think

April 10, 2014
On a scale of 1 to 10, this vulnerability is an 11. Here are the steps to take to thoroughly protect yourself from this OpenSSL bug
Read more »

Repeat after me: Model your security threats first

April 08, 2014
Organizations often deploy defenses before they know which attacks will nail them. A new book helps security pros model those threats and design defenses
Read more »

Protect your source code before it's too late

April 01, 2014
Developers still use primitive security measures, despite many examples of stolen or maliciously modified programs
Read more »

You want to know who has access to what? Good luck

March 25, 2014
Access control sounds simple, until you try to tease out rights and permissions for every user in your environment
Read more »

The bad guys have your credit card info -- so what?

March 18, 2014
Cyber criminals can already access your financial data, and credit card breaches can be beneficial in the long run
Read more »

7 steps to choosing security software

March 11, 2014
Every software vendor says its product is a panacea. Here's how to perform a rigorous evaluation -- and find a solution for your needs
Read more »

Everything I know about computer security I learned in kindergarten

March 04, 2014
Dying to implement the latest surefire, algorithmically infallible defense? You're better off acting on time-tested wisdom
Security
Read more »

To build the best defense, know which attack is which

February 25, 2014
Cyber criminals seeking to plunder your environment use two approaches -- know the difference to become a better defender
Read more »
©1994-2014 Infoworld, Inc.