Information Security Research Library Copyright © 1998-2013 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
When negotiating with cloud providers, enterprises must demand cloud contracts with specific security and control provisions, Gartner analysts say.
Francoise Gilbert provides a cloud data breach notification overview for enterprises concerned about placing personal information in the cloud.
Cloud service providers are working with authorized third-party auditors to meet FedRAMP security controls. The 3PAOs tell us how it’s going, so far.
Microsoft released Office Mobile for iPhone but it requires an Office 365 subscription and isn't made for iPad.
Knowledge of the National Security Agency's surveillance has led some companies to revamp their data privacy policies.
You can use Apple Configurator and over-the-air methods to send configuration profiles to iPads, giving you more control over iPad administration.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.
The latest variant of the banking Trojan is causing numerous problems, Symantec said.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
Whether starting your career or planning your next step as an IT security professional, this tip will guide you toward the best certifications for your interests and experience.
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lessons and technical advice on the hottest topics in the midmarket IT security industry. Through our tutorials we seek to provide site members with the foundational knowledge needed to deal with the increasingly challenging job of keeping their organizations secure.
Expert Nick Lewis details how automated exploit kits are evolving and offers mitigations for the latest methods employed by these attack toolkits.
The software giant's May 2013 Patch Tuesday update permanently fixes the IE8 zero-day flaw found in the Dept. of Labor website attack.
Expert Dave Shackleford details how enterprises can increasingly manage their own cloud security controls with private virtual cloud offerings.
The worldwide security technology and services market will reach $67.2bn in 2013, up 8.7% from 2012, according to research firm Gartner
A modified phone charger or battery could be used to hack Apple devices, say researchers from Georgia Tech
IT asset management expert Barb Rembiesa explains how ITAM best practices like IT asset standardization and rationalization reduce IT security risk.
Government departments are likely to buy more infrastructure and software services from the CloudStore this year, finds research
The investigation into the Post Office’s allegedly faulty accounting system will focus on a select few of the 47 claims
Formulating the right enterprise-wide information governance policies is essential in heading off potential legal and compliance costs