6 things security pros keep getting wrong

May 20, 2014
Nobody's perfect -- especially computer security professionals. Fortunately, there's a pattern to the mistakes. Here are some of the most common ones to watch for
Read more »

Want 'perfect' security? Then threat data must be shared

May 13, 2014
Today we have all kinds of organizations tracking various slices of the threatscape. A concerted effort to pool all that data would form a new bulwark against attack
Read more »

Don't let the latest zero-day fool you

May 06, 2014
The Internet Explorer exploit patched by Microsoft last week was serious stuff, but, if you're prioritizing holes to plug, browser vulnerabilities shouldn't be first on the list
Read more »

5 takeaways from Verizon's 2014 Data Breach Investigations Report

April 29, 2014
If there's one security report you should read every year, this is it. Trends include rising corporate espionage, more frequent ATM compromises, and improved hack detection
Read more »

The sky is falling! Hackers target satellites

April 22, 2014
IOActive reports finds serious risks -- and slim prospects for fixes -- in satellite communications
Read more »

The right way to secure the Internet of things

April 15, 2014
Security products and practices will be reinvented to protect the Internet of things, but the real solution centers on a simple idea
Read more »

The Heartbleed OpenSSL flaw is worse than you think

April 10, 2014
On a scale of 1 to 10, this vulnerability is an 11. Here are the steps to take to thoroughly protect yourself from this OpenSSL bug
Read more »

Repeat after me: Model your security threats first

April 08, 2014
Organizations often deploy defenses before they know which attacks will nail them. A new book helps security pros model those threats and design defenses
Read more »

Protect your source code before it's too late

April 01, 2014
Developers still use primitive security measures, despite many examples of stolen or maliciously modified programs
Read more »

You want to know who has access to what? Good luck

March 25, 2014
Access control sounds simple, until you try to tease out rights and permissions for every user in your environment
Read more »
©1994-2014 Infoworld, Inc.