Security Services April 24, 2015 Security Management: Critical Capabilities for Compliance and Security Intelligence 2 min read - Increased cyberthreats and compliance regulations are requiring organizations to pay more attention to their security management strategy.
Data Protection April 24, 2015 Top Tips for Surviving a Data Encryption Project 3 min read - Encrypting your data is an important step for keeping it secure. Follow these tips to keep your data encryption project running smoothly.
April 23, 2015 Vulnerability in Magento Could Have Exposed 200,000 E-commerce Sites to Attack 2 min read - A vulnerability in Magento — the e-commerce platform owned by eBay — was patched but could have left more than 200,000 sites exposed to cybercriminals.
April 23, 2015 Research Suggests Being Hit by Mobile Malware Is as Rare as Being Struck by Lightning 2 min read - Damballa unveiled results of a two-year study at the RSA Conference that showed mobile malware threats may be overhyped — as rare as a lightning strike.
X-Force April 23, 2015 The Game Is Afoot: Threat Intelligence Spans Machines to Automate Defensive Reactions 3 min read - Defenders must share threat data and methods across organizations and industries. Threat intelligence requires a common machine-readable format.
April 22, 2015 PayPal Suggests Biometric Identification Will One Day ‘Kill All Passwords’ 2 min read - A login mechanism you could eat, digital tattoos and vein recognition could be among the biometric identification tools that protect users, PayPal says.
Security Services April 22, 2015 Safeguarding Hybrid IT: The Secret to Having It All in IT Security 2 min read - CISOs know IT security can be good for business and are looking at MSSPs to boost security monitoring, analytics, intelligence and response.
April 21, 2015 Google Ad Services Pushes for Near-Total Traffic Encryption to Fight Malvertising 2 min read - In response to growing incidents of malvertising, Google Ad Services has announced that the majority of its traffic will be encrypted by June 30.
Fraud Protection April 21, 2015 Taking Evasive Actions Against Cyberfraud 2 min read - Cybercriminals are investing time and effort to improve their cyberfraud techniques in order to evade detection by security researchers and solutions.
Software Vulnerabilities April 21, 2015 CVE-2015-1097: Deobfuscating iOS Kernel Pointers With an IBM X-Force-Discovered Vulnerability 4 min read - IBM's X-Force Application Security Research Team has discovered a memory disclosure vulnerability in iOS IOKit IOMobileFrameBuffer.