Dnešní oblíbený obsah
Nejnovější příspěvky blogu
Buďte informováni o novinkách!
Dark Reading is the premier online resource helping information security professionals manage the balance between protection and access. It offers breaking news and analysis on attacks, breaches and vulnerabilities, as well as strategies for protecting enterprise data. It also offers guidance on setting risk management and compliance policies.
Aktualizace: 14 min 38 sek zpět
Additional funding comes from a number of Phoenix Group affiliates and other investors
Secret identities are a good thing. Multiple identities? Not so much
Shareholders to receive $24.75 per share in cash in transaction valued at approximately $1 billion
After years of relying on passwords, technology vendors -- and enterprises -- are ready for new methods of proving user identity.
Web apps are essential to your business -- and easy targets for hackers. Here are some tips for keeping them secure
While distributed denial-of-service attacks topping 100 Gbps garner the headlines, they are not the threat that should worry most companies
Information security keeps evolving, but our educational methods are not evolving rapidly enough to win the cold cyberwar
Hoping other people detect your breach before you lose millions is not a good strategy
Hoping other people detect your breach before you lose millions
Hoping other people detect your breach before you lose millions.
Web Application Firewall, version 7.8, aimed at reducing impact of automated attack attempts from botnets
Organizers have confirmed some early details on Briefings talks
Information-stealing malware campaign spreads via phishing email attachments posing as Indian military secrets
Risk-based security decisions usually yield more secure environments, but some harmonization with regulations needs to be done to prove compliance
Employees can safely access content from their personal mobile device in a secure, encrypted container
Fixmo SharePlace enables secure and compliant access to SharePoint from Apple iOS and Android devices
Built on the concept that only known devices should ever access a protected network
U.S., other national government agencies, contractors, and military networks found housing new Pushdo bots as botnet adds stealthier features to evade detection, takedown
Prison time marks the end of a prominent chapter in hacktivist history, one security researcher says
Revenue totaled $7.9 million for the first quarter of 2013
Pondělí, 27. Květen
Čtvrtek, 6. Červen
Čtvrtek, 4. Červenec
Security Vulnerabilities & Exploits