Hack of New York Times Holds a Lesson for All Businesses

The New York Times, Twitter, and other major sites were knocked offline in an attack by the Syrian Electronic Army (SEA). While there is certainly a political motivation to the hacks, there is an underlying lesson that all businesses should learn.

Dealing With DNS Attacks

The Syrian Electronic Army, a pro-Assad hacking group, altered the DNS records used by the New York Times, Twitter, and the Huffington Post. Here are three ways such attacks happen, and how they can be mitigated.

7 Characteristics of a Secure Mobile App

When it comes to building secure mobile applications, errors most often occur in session management. By themselves, these mistakes do not present a significant risk, but the more mistakes made, the more vulnerable the application. And therein lies the problem: I often find several of these errors in any given app.


Cloud Security: The Basics

The Cloud Security Alliance and others are working to define security requirements for SaaS, IaaS, and PaaS cloud computing models.


10 Ways to Secure Browsing in the Enterprise

Make users' browsing safe (or safer) by thinking holistically about Web security, from browser settings to policies and education.


Mobility, BYOD, and Collaboration will Drive SaaS Adoption in India: Zoho

Raju Vegesna, chief evangelist for Zoho, speaks about the SaaS market in India, the factors contributing to the increase in SaaS adoption, and how mobility and BYOD are changing the game.


19 Ways to Build Physical Security into a Data Center

Mantraps, access control systems, bollards and surveillance. Your guide to securing the data center against physical threats and intrusions.


A Few Good Information Security Metrics

Andrew Jaquith says information security metrics don't have to rely on heavy-duty math to be effective, but they also don't have to be dumbed down to red, yellow, green. Here are five smart measurements--and effective ways to present them.

3 Key Issues For Secure Virtualization

Deal with these three main security concerns to improve your virtualized IT environment, says Bernard Golden.


Has Trust Really Moved to the Cloud?

The only way to restore the balance between our acquaintances and trusted connections is to outsource how we trust.


10 Crazy IT Security Tricks That Actually Work

IT security threats are constantly evolving. It's time for IT security pros to get ingenious.


Silly Security Mistakes: Things You Overlooked While Doing the Hard Stuff

While you were upgrading your servers with the latest intrusion detection, did someone just walk in and steal them? We urge you not to forget the obvious when you're doing your security planning.

Cost of Cyber Attacks are Skyrocketing

According to a 2011 study by the Ponemon Institute, the cost of cybercrime in the US could range from $1.5 million to $36.5 million annually.


India is Attracting Lots of Investments, Including from Cybercrime: John Kendall

John Kendall of Unisys gives us a view on how biometric technologies are gearing up to be an integral part of the enterprise security strategy.

Slide Show

15 Worst Data Breaches

Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one? For some perspective, we take a look at 15 of the biggest incidents in recent memory.


How to Build Multiple Layers of Security for Your Small Business

The complex and ever-changing security landscape can befuddle small businesses, and the plain truth is that there is no silver security bullet. Small businesses would be well-advised to deploy a multi-faceted security strategy. Here are eight must-have checklist items.


10 Ways to Secure Browsing in the Enterprise

Make users' browsing safe (or safer) by thinking holistically about Web security, from browser settings to policies and education.


Security in the Cloud Is All About Visibility and Control

When it comes to security in the cloud, organizations are confident in their cloud providers, but also and reluctant to expose certain types of data and applications, according to IT industry association CompTIA. Security vendors maintain the problem is one of visibility and control, and each has a solution.


SaaS, PaaS, and IaaS: A Security Checklist for Cloud Models

Key security issues can vary depending on the cloud model you're using. Vordel CTO Mark O'Neill looks at 5 critical challenges.


RSA Chief: New Tech Relies on Security to be Valuable

Executive Chairman of RSA, EMC's Security Division, Art Coviello talks about the potential of cloud computing and how security needs to adapt to the BYOD concept.

Amazon Sheds Light on it's Cloud Security Practices, Joins CSA Registry

Amazon, and Terremark each submit information to join the Cloud Security Alliance's STAR program.