applications - News, Features, and Slideshows

Most popular

News about applications
  • When is your infrastructure safe from Heartbleed?

    By Antone Gonsalves | 24 July, 2014 22:42

    Now that IT departments have fixed the Heartbleed bug in most internet-facing software, security pros have started debating the risk of not patching software buried deep in the data center.

  • Duo sentenced to 14 years for Apple Phishing scheme

    By Steve Ragan | 23 July, 2014 23:02

    Two people have been sentenced to a total of 14 years in prison for conducting a Phishing campaign that targeted banking details. The criminals accused, Constanta Agrigoroaie, 23, and Radu Savoae, 28, used the stolen funds as a means to bring foreign criminals into the U.K.

  • Nigerian scammers move from gullible consumers to businesses

    By Antone Gonsalves | 23 July, 2014 10:53

    Nigerian scammers known for grammatically challenged email promising riches in return for a small up-front payment are moving into the business of launching malware attacks against companies.

  • Hackers inside Chinese military steal U.S. corporate trade secrets

    By David Geer | 23 July, 2014 02:55

    In May, a grand jury in the Western District of Pennsylvania indicted five members of the Chinese military on charges of hacking and economic espionage, according to a May 19 U.S. Department of Justice media release. Per the same release, the targets were six U.S. enterprises operating in the solar products, nuclear power, and metals industries. The attacks began as early as 2006 and were carried out over many years and into this year, according to the same release.

  • Virtru launches business email encryption service for Google Apps

    By Jeremy Kirk | 22 July, 2014 21:34

    Email encryption startup Virtru has launched a version of its service for businesses using Google Apps, a market segment that the company thinks is showing increased interest in secure communications.

Tutorials about applications
Features about applications
  • Three strategies for the new era of enterprise cybersecurity

    By John N. Stewart | 18 June, 2014 06:11

    The pace of change for Information Technology is challenging established notions of "What is IT?" and "What is Information Security in the modern age?" For one example, the "new" data center technologies such as virtualization, Software-Defined Networking (SDN), service-oriented delivery models, and cloud computing have radically changed the typical IT infrastructure from a defined set of assets owned and controlled by the organization to a constantly fluctuating roster of resources that can come and go from IT department visibility and control.

  • 5 summer scams to watch out for this season

    By Taylor Armerding | 05 June, 2014 23:26

    It is almost summertime, and while the livin' supposedly gets a bit easier, it remains risky. As the vacation season approaches and everybody is planning travel, socializing with friends and family and relaxing, people in the "always connected" world should add one more item to their list: Don't relax when it comes to online security.

  • The use of mobile credentials is on the rise, but can they be secured?

    By Grant Hatchimonji | 03 June, 2014 05:05

    Given the current prevalence of mobile devices, especially smartphones, it comes as no surprise that they are becoming more and more entwined with everyday aspects of our lives. We don't just use them to make calls, to text, or to browse the internet anymore. We can use them to do just about anything, and that includes using them as a means to provide our credentials.

  • Information overload: Finding signals in the noise

    By Steve Ragan | 30 May, 2014 02:38

    Signal-to-noise ratios are hard to manage. As a security professional, you want the threat data, you want the attack notifications and alerts, and you need intelligence. But, when there's too much coming in, those alerts and notifications fall to the wayside. They're easily dismissed and ignored.

  • Needed: Breach detection correction

    By Taylor Armerding | 28 May, 2014 02:38

    There is no shame in being breached by a cyber attack -- security experts are unanimous about that. Prevention, while a worthy part of a risk management strategy, will never be 100% successful, given the sophistication and overwhelming volume of attacks.

Whitepapers about applications

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Sophos Mobile Control

Data protection, policy compliance and device control for mobile devices

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.