Repeat after me: Model your security threats first

April 08, 2014
Organizations often deploy defenses before they know which attacks will nail them. A new book helps security pros model those threats and design defenses
Read more »

Protect your source code before it's too late

April 01, 2014
Developers still use primitive security measures, despite many examples of stolen or maliciously modified programs
Read more »

You want to know who has access to what? Good luck

March 25, 2014
Access control sounds simple, until you try to tease out rights and permissions for every user in your environment
Read more »

The bad guys have your credit card info -- so what?

March 18, 2014
Cyber criminals can already access your financial data, and credit card breaches can be beneficial in the long run
Read more »

7 steps to choosing security software

March 11, 2014
Every software vendor says its product is a panacea. Here's how to perform a rigorous evaluation -- and find a solution for your needs
Read more »

Everything I know about computer security I learned in kindergarten

March 04, 2014
Dying to implement the latest surefire, algorithmically infallible defense? You're better off acting on time-tested wisdom
Security
Read more »

To build the best defense, know which attack is which

February 25, 2014
Cyber criminals seeking to plunder your environment use two approaches -- know the difference to become a better defender
Read more »

Operation clean sweep: How to disinfect a compromised network

February 18, 2014
You can't remove every bad scrap, but due diligence can go a long way toward yielding a clean, reliable network
Read more »

How to land a job in IT security

February 11, 2014
To be a security pro, decide on a specialization, then learn as much as you can through formal channels or by self-education
Read more »

Should you worry about memory-only malware?

February 04, 2014
Some malware disappears when you reboot, but returns if you haven't plugged the hole where it came in. Is this scourge worse than others?
Read more »
©1994-2014 Infoworld, Inc.