The New York Times, Twitter, and other major sites were knocked offline in an attack by the Syrian Electronic Army (SEA). While there is certainly a political motivation to the hacks, there is an underlying lesson that all businesses should learn.
The Syrian Electronic Army, a pro-Assad hacking group, altered the DNS records used by the New York Times, Twitter, and the Huffington Post. Here are three ways such attacks happen, and how they can be mitigated.
When it comes to building secure mobile applications, errors most often occur in session management. By themselves, these mistakes do not present a significant risk, but the more mistakes made, the more vulnerable the application. And therein lies the problem: I often find several of these errors in any given app.
The Cloud Security Alliance and others are working to define security requirements for SaaS, IaaS, and PaaS cloud computing models.
Raju Vegesna, chief evangelist for Zoho, speaks about the SaaS market in India, the factors contributing to the increase in SaaS adoption, and how mobility and BYOD are changing the game.
Mantraps, access control systems, bollards and surveillance. Your guide to securing the data center against physical threats and intrusions.
Andrew Jaquith says information security metrics don't have to rely on heavy-duty math to be effective, but they also don't have to be dumbed down to red, yellow, green. Here are five smart measurements--and effective ways to present them.
Deal with these three main security concerns to improve your virtualized IT environment, says Bernard Golden.
The only way to restore the balance between our acquaintances and trusted connections is to outsource how we trust.
IT security threats are constantly evolving. It's time for IT security pros to get ingenious.
While you were upgrading your servers with the latest intrusion detection, did someone just walk in and steal them? We urge you not to forget the obvious when you're doing your security planning.
According to a 2011 study by the Ponemon Institute, the cost of cybercrime in the US could range from $1.5 million to $36.5 million annually.
John Kendall of Unisys gives us a view on how biometric technologies are gearing up to be an integral part of the enterprise security strategy.
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one? For some perspective, we take a look at 15 of the biggest incidents in recent memory.
The complex and ever-changing security landscape can befuddle small businesses, and the plain truth is that there is no silver security bullet. Small businesses would be well-advised to deploy a multi-faceted security strategy. Here are eight must-have checklist items.
When it comes to security in the cloud, organizations are confident in their cloud providers, but also and reluctant to expose certain types of data and applications, according to IT industry association CompTIA. Security vendors maintain the problem is one of visibility and control, and each has a solution.
Key security issues can vary depending on the cloud model you're using. Vordel CTO Mark O'Neill looks at 5 critical challenges.
Executive Chairman of RSA, EMC's Security Division, Art Coviello talks about the potential of cloud computing and how security needs to adapt to the BYOD concept.