Nearly two weeks since news of Shellshock broke, attacks that are taking advantage of the Bash vulnerabilities are grabbing headlines. But Michael Smith of Akamai warns that the battle against hackers capitalizing on Shellshock could go on for years.
As researchers scramble to learn more about Shellshock and the risks it poses to operating systems, servers and devices, Michael Smith of Akamai explains why not all patches are actually fixing the problem.
The British government aims to increase uptake of five essential security controls at U.K. businesses, backed by third-party annual audits and a badge of compliance. Many government contractors must comply.
To address new features and new threats, the National Institute of Standards and Technology has revised its guidance for transport layer protocol. Learn about the recommendations for protecting data during transmission.
Organizations across all industry sectors understand the importance of information security. But turning security awareness into meaningful action - that's the challenge that many midsized entities face, says Sophos' Nick Bray.
Fraudsters continually find new ways to attack, but too many organizations rely on old, unsuccessful methods to detect and prevent fraud. This is the premise, says David Mattos, VP Sales, with Easy Solutions.
With seemingly adversarial requirements for increased access and providing appropriate security, healthcare IT leaders are facing growing and emergent challenges. Providers, employees, visitors, patients - all want access to more and more information from any device of their choosing.
These market forces present...
Learn from ING how one of the largest financial services corporations implemented ReputationDV (RepDV) from HP TippingPoint to proactively secure their network without compromising performance. RepDV, a
security intelligence tool, monitors inbound and outbound communications to identify and block undesirable hosts....
Next-generation network security devices provide comprehensive contextual awareness and deeper analysis of network traffic. This complete contextual
awareness, combined with security automation, provides the visibility and agility necessary to keep pace with today's fluid IT environment, increasing network speeds and...