According to one researcher, most enterprise wireless networks are likely vulnerable to Cupid, a proof-of-concept based on the Heartbleed attack. (SearchSecurity.com)
For enterprises, the sudden shuttering of the disk-encryption utility TrueCrypt highlights the risk of using open source security tools. (SearchSecurity.com)
The encryption of EBS volumes is welcome news for cloud customers and security experts, but key management may be an issue for some customers. (SearchAWS.com)
Security pros say infosec teams must be proactive on cloud security management to reduce risk related to rapid growth in enterprise cloud computing. (SearchCloudSecurity.com)
Video: John Pescatore discusses why the SANS Institute's Critical Security Controls make up for other security deficiencies and assesses Gartner's true value to security teams. (SearchSecurity.com)
In our special weeklong series, learn how to find the ideal unified threat management device for your enterprise. Discover how UTMs work, their pros and cons and more. (SearchSecurity.com)
New technology integrates threat intelligence and evaluates it against known system vulnerabilities for better prioritization of security controls. (SearchSecurity.com)
Compliance expert Mike Chapple reviews changes to HIPAA business associate agreements under the Omnibus Rule and what they mean for covered entities. (SearchSecurity.com)
Expert Dejan Lukan takes a look at the potential threats to cloud virtualization, and reviews the best security controls to prevent them. (SearchCloudSecurity.com)
About This E-Newsletter This e-newsletter is published by the TechTarget network. To unsubscribe from Security Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.
No comments :
Post a Comment