Picking Apart Malware In The Cloud
Setting up a lab to analyze potentially malicious binaries takes time, so more companies are signing up for services that handle the work
PCI: Dead Man(date) Walking?
Is Visa's program to eliminate the requirement for assessments in lieu of EMV (chip and pin) transactions the death knell for PCI? Not yet, but the writing is on the wall
Security Teams Need Better Intel, More Offense
Adversaries go through five steps to prepare and execute an attack, but defenders only react to the last two steps. It's time for defenders to add intelligence gathering, counterintel, and even offense to the game, security experts say
Healthcare Industry Now Sharing Attack Intelligence
New HITRUST Cybersecurity Incident Response and Coordination Center lets healthcare organizations, U.S. Department of Health and Human Services swap information, forensics from firsthand attack experiences, other threats
Google Drive: Hands-On Winner
Google's new online storage service represents the natural evolution of Google Docs, and another transformation for the world of collaborative file management.
Insecure API Implementations Threaten Cloud
Web and cloud services allow third-party access by exposing application programming interfaces, but many developers and customers do not adequately secure the keys to the cloud and their data, experts say
How To Secure Large Data Warehouses
As more businesses consolidate sensitive data in high-capacity warehouses, the question becomes how to properly secure these potential treasure-houses. Here are some tips
Anonymous Drives Security Fears, But Not Spending
Information security budgets remain focused on stopping malware and advanced persistent threats (APTs), which tend to do more damage in the long run than hacktivists' SQL injection and DDoS attacks.
Making Mobile Banking Safe
Banks finding ways to balance security with convenience, but consumers have no way of determining what's safe to use
TSA Tests Identity Verification System
In wake of invalid boarding pass scares, Transportation Security Agency seeks to automate the process of authenticating travel documents and matching them to IDs.
How To Protect Big Data Analytics
Big data analytics often means big challenges when it comes to data protection. Here are some things to keep in mind when you're working in these environments.
|