search online

Wednesday, June 4, 2014

Heartbleed returns: Most enterprise Wi-Fi networks vulnerable

Security Digest
Information security news and advice from TechTarget's network | June 4, 2014
TechTarget
FEATURED STORY
New Heartbleed exploit targets wireless networks
by Brandan Blevins, News Writer

According to one researcher, most enterprise wireless networks are likely vulnerable to Cupid, a proof-of-concept based on the Heartbleed attack. (SearchSecurity.com)

Advertisement
NEWS
 
TrueCrypt shutdown leaves unanswered questions

For enterprises, the sudden shuttering of the disk-encryption utility TrueCrypt highlights the risk of using open source security tools. (SearchSecurity.com)

 
AWS attends to cloud security with EBS encryption
The encryption of EBS volumes is welcome news for cloud customers and security experts, but key management may be an issue for some customers. (SearchAWS.com)
 

To reduce cloud risk, infosec must be proactive

Security pros say infosec teams must be proactive on cloud security management to reduce risk related to rapid growth in enterprise cloud computing. (SearchCloudSecurity.com)

 
Pescatore: Security controls prevent worst-case scenarios

Video: John Pescatore discusses why the SANS Institute's Critical Security Controls make up for other security deficiencies and assesses Gartner's true value to security teams. (SearchSecurity.com)

EXPERT ADVICE
 

UTM week: Understanding UTM and its vendors

In our special weeklong series, learn how to find the ideal unified threat management device for your enterprise. Discover how UTMs work, their pros and cons and more. (SearchSecurity.com)

 
Does your SIEM integrate threat intelligence data?

New technology integrates threat intelligence and evaluates it against known system vulnerabilities for better prioritization of security controls. (SearchSecurity.com)

 

HIPAA Omnibus demands changes to business associate agreements

Compliance expert Mike Chapple reviews changes to HIPAA business associate agreements under the Omnibus Rule and what they mean for covered entities.  (SearchSecurity.com)

 
Limiting the security risks of cloud virtualization

Expert Dejan Lukan takes a look at the potential threats to cloud virtualization, and reviews the best security controls to prevent them. (SearchCloudSecurity.com)

About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Security Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2014 TechTarget. All rights reserved.
TechTarget

No comments :

Post a Comment