security: Perimeter Security
S.C. Security Blunders Show Why States Get Hacked
Governor blames data breach on Russian hackers and the IRS, but states' by-the-book IT ethos shows rules and regulations are the real culprit.
Royal Security Fail: 'May I Speak To Kate?'
The oldest -- and most effective -- social engineering trick in the book remains getting on the phone and impersonating an insider. Ask Kate...
Social Networks Continue Push For Control
The Internet was supposed to facilitate direct connections between individuals and disempower gatekeepers. Instead, it has become a massive...
Should LulzSec Suspect Face Life In Prison?
Computer hacking, identity theft, and fraudulent credit card charges could add up to 30 years to life for alleged Stratfor hacker Jeremy Hammond.
Facebook 'Privacy Notice' Has No Legs
But Facebook should be looking at why the notice went viral.
Petraeus Mission Impossible: Cloaking Email, Online Identities
So-called security experts making basic information security errors isn't a new occurrence. Arguably, it even led to the rise of the Anonymous...
The Petraeus Affair: Surveillance State Stopper?
Lawmakers, now reminded of their own vulnerability, need to strengthen email privacy protections. Companies need to do more to help customers...
5 Items Should Top Obama's Technology Agenda
From infrastructure to tech education, here's what I want to see on the to-do list for the next four years.
5 Emerging Enterprise Technologies
If you are not watching these developments, your business is missing out. Here's what Gartner's annual top 10 tech trends list missed.
Frankenstory: Attack Of The Iranian Cyber Warriors
Citing no hard evidence, U.S. government officials have been stoking fears that the Iranians are out to get us.
Security Newsletter Sign Up
Get timely, actionable insights tailored to the topics you are interested in.
Sign UpTop Stories
-
5 Items Should Top Obama's Technology Agenda
November 07, 2012From infrastructure to tech education, here's what I want to see on the to-do list for the next four years.
-
Who Is Hacking U.S. Banks? 8 Facts
October 23, 2012Hackers have labeled the bank website disruptions as grassroots-level reprisal for an anti-Islamic film. But is the Iranian government really...
-
Mobile Biometrics: Your Device Defines You
October 04, 2012Will mobile biometrics be an identity and access management driver in the enterprise?
-
Cloud Services Face Different Security Threats
September 18, 2012Alert Logic study finds that cloud and on-premises customers face about the same number, but different types, of threats.
-
IBM Launches Advanced Threat Detection Appliances
July 31, 2012Security monitoring devices help enterprises reduce risk by controlling the applications, sites, and online services accessed by employees.
-
Strike Back At Hackers? Get A Lawyer
July 27, 2012Don't risk legal troubles. Get advice before taking the offensive against cybercriminals, military security expert says at Black Hat.
-
Evader Tool Shows Holes In Network Perimeter Security
July 25, 2012Unveiled at Black Hat security conference, free testing tool checks for attacks employing so-called advanced evasion techniques.
-
IT Rates IBM's Q1 Labs Top SIEM Performer
July 09, 2012Our IT Pro Ranking Survey evaluates eight SIEM vendors.
-
4 Ways To Find Real Enterprise Security Threats
May 14, 2012Companies re-prioritizing their defensive security efforts need to look beyond vulnerabilities. Here's advice on how to find the real threats to...
-
Many Identity Theft Protection Services Promise The Impossible
April 20, 2012Consumer Federation of America report warns about ID theft service providers that offer vague, misleading, or incomplete assurances about their...
More
News »
Slideshows
Resource Links
Related Webcasts
- Is Your Network Ready for BYOD?
- Storage Encryption Options for Better Security
- Getting a Fix On Your Security Posture: What Your Logs Aren't Telling You
- Outsourcing Security: What Every Potential Cloud Security Customer Should Know
- Delivering on Real-time and Cross-Channel Fraud Detection: Effectively Responding to Increasing Velocity and Channels
This Week's Issue
Free Print Subscription
SubscribeCurrent Government Issue
- Data Center Optimization: Federal agencies must increase server utilization and energy efficiency as they squeeze more computer processing into fewer data centers. We explore how the Army, Homeland Security, Veterans Affairs and others are doing that.
- Future Cities: The world's urban centers are growing, creating a civic management challenge of unprecedented scope and complexity. Our exclusive survey reveals the opportunities and challenges for city planners and municipal IT pros.
- Read the Current Issue












