Security Channel

Network security news, reviews, and advice on malware defense, data security, hacker countermeasures, and security management.

Security Articles

IBM buys access control and identity management firm CrossIdeas

With CrossIdeas, IBM is gaining auditing tools for policing segregation-of-duties violations across disparate systems

No patch yet for zero day in Symantec Endpoint Protection software driver

Symantec has published recommendations for mitigating the danger

Many antivirus products are riddled with security flaws

Antivirus products increase a computer's attack surface and may even lower an operating system's protections, a security researcher claims

iPhone gets first free app for encrypting voice calls

Open-source Signal app is compatible with RedPhone, its Android sibling

3 zero-day flaws found in Symantec's Endpoint Protection

Security vendor Offensive Security says the flaws could be used to gain full system access

Mobile management: Making sense of your options

There are known, proven approaches to reduce mobile security risks without disabling the benefit of consumerization

BlackBerry adds more security for the sensitive enterprise

BlackBerry says it can offer levels of security that can not be replicated on Apple, Android or other mobile devices

Android vulnerability allows malware to compromise most devices and apps

Attackers can impersonate trusted developers to gain powerful privileges on the OS, researchers from Bluebox Security say

The data dangers of free public Wi-Fi

New York's plan to turn pay phones into free Wi-Fi stations could be a template for other cities, and bad news for IT trying to protect corporate data and IP

How to protect personal, corporate information when you travel

Today's hotels are unfortunately vulnerable to types of attempted fraud. Here's how to keep data safe

Security White Paper

Information Security and Multi-Compliance

It’s common for information security managers to be held responsible for situations where they have little control or... more

Security Blog entry

Let your worst fears be your guide

Your computer security defense should be built with the assumption that all attackers are trusted, highly privileged insiders... more

Security White Paper

ITCi White Paper: Challenges and...

The Payment Card Industry Data Security Standard (PCI DSS) provides an enterprise structure for improving operational, security,... more

7 indispensable project management tips
SECURITY ADVISER
7 indispensable project management tips

Blog by Roger A. Grimes

Good project managers are worth their weight in gold -- and earn their keep by following these best practices
Deep Dives
Digital Spotlight: Cloud Security:

In this Digital Spotlight on Cloud Computing, we tackle these challenges head-on, beginning with an examination of the "notorious nine"....

Download the 'How to Rethink Security' Deep Dive:

here is a pageThe bad guys are persistent, sophisticated, and they are making inroads. It is hard to be optimistic....

Download the Identity Management Deep Dive:

Identity management is no laughing matter. Yet a simple glance at today's headlines recounting innumerable hack attacks and data spills....

See all Deep Dives
©1994-2014 Infoworld, Inc.