Security

RSS
Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.
  • How network virtualization is used as a security tool

    Posted September 15, 2014 - 9:12 pm

    As VMware sells its network virtualization software, it's finding that security is a big driver for adoption.
  • Google reports a 19% jump in US government data requests

    Posted September 15, 2014 - 7:07 pm

    Google fielded 19 percent more requests from the U.S. government for data on its users in the first half of this year compared to the second half of last year, the company said Monday.
  • Yahoo slams new 'digital will' law, says users have privacy when they die

    Posted September 15, 2014 - 4:22 pm

    What should happen to your personal digital communications -- emails, chats, photos and the like -- after you die? Should they be treated like physical letters for the purposes of a will?
  • Everything you need to know about keeping your Google account safe

    Posted September 15, 2014 - 2:57 pm

    Last week there were inaccurate reports that millions of Google passwords were hacked. It wasn't really the case, but you still should keep your Google account as safe as possible. Here's how to go a long way towards making sure it doesn't get hacked.
  • Open-source project promises easy-to-use encryption for email, instant messaging and more

    Posted September 15, 2014 - 1:40 pm

    A software development project launched Monday aims to create free tools that simplify the encryption of online forms of communication like email, instant messaging, SMS and more by solving the complexity associated with the exchange and management of encryption keys.
  • Sprint, Windstream traffic routing errors hijacked other ISPs

    Posted September 14, 2014 - 10:25 pm

    Internet traffic routing errors made by U.S. operators Sprint and Windstream on the same day last week underscore a long-known Internet weakness, posing both security and reliability issues.
  • White Paper

    The 2014 Next Generation Firewall Challenge

    Posted September 12, 2014 - 7:32 pm

    The Target security breach and discovery of the "Heartbleed" vulnerability in web encryption software taught us some important lessons about enterprise security.
  • White Paper

    Building a Better Network Strategy

    Posted September 12, 2014 - 7:32 pm

    Today's mobile workforce and the use of personal smartphones, laptops, and tablets for company work introduce new potential problems to guard against. And hackers are not sitting still. Learn More>>
  • White Paper

    8 Ways To Better Monitor Network Security Threats in the Age of BYOD

    Posted September 12, 2014 - 7:32 pm

    The age of BYOD is here, and with a myriad of threats and challenges so broad that some have dubbed the phenomenon "Bring Your Own Disaster." Read this white paper to learn more.
  • White Paper

    Big Security for Big Data

    Posted September 12, 2014 - 7:32 pm

    In order to meet current security problems, a new paradigm shift needs to occur. Businesses need the ability to secure data, collect it, and aggregate into an intelligent format. This white paper will give you the information you need to get started.
  • White Paper

    3 Big Data Security Analytics Techniques You Can Apply Now to Catch Advanced Persistent Threats

    Posted September 12, 2014 - 7:32 pm

    This technical white paper demonstrates how to use Big Data security analytics techniques to detect advanced persistent threat (APT) cyber attacks, and it shows how HP ArcSight applies these techniques to spot and stop attacks.
  • White Paper

    SANS Security Analytics Survey

    Posted September 12, 2014 - 7:31 pm

    Survey: Big Data and Security Analytics. Download this whitepaper to access the results. Read Now>>
  • White Paper

    10 Ways to Build a Better Big Data Security Strategy

    Posted September 12, 2014 - 7:31 pm

    This IT Manager's Journal will discuss 10 best practices you can employ in your journey down the path of securing Big Data and show how Big Data can be both a problem and a solution.
  • White Paper

    eBook: Security for a faster world

    Posted September 12, 2014 - 7:31 pm

    Business today is driven by a global economy that generates an unprecedented volume and variety of data with alarming velocity. The information in this dossier can help your security team adapt to a world that's evolving faster than ever before
  • White Paper

    Improve Your Security in 30 Days

    Posted September 12, 2014 - 7:31 pm

    This (slightly tongue-in-cheek) white paper shows how you can use HP TippingPoint to materially improve your security posture in 30 days.
  • White Paper

    Magic Quadrant for Intrusion Prevention Systems

    Posted September 12, 2014 - 7:31 pm

    The 2013 Gartner Magic Quadrant for Next-Generation Intrusion Prevention System (NGIPS) has been published and HP TippingPoint is in the Leaders Quadrant for the ninth consecutive year.
  • White Paper

    2013 Cyber Risk Report

    Posted September 12, 2014 - 7:31 pm

    The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat landscape.
  • White Paper

    The Bot Threat

    Posted September 12, 2014 - 7:31 pm

    Download this whitepaper and learn how bots work and how, by adopting the right strategy, you can use a defense-in-depth strategy to effectively prevent direct attacks against your critical systems.
  • White Paper

    Why You Need a Next-Generation Firewall

    Posted September 12, 2014 - 7:31 pm

    To stay ahead of the threats, it's time for IT to embrace next-generation firewalls
  • White Paper

    Gartner: A New Approach to Malware Defense

    Posted September 12, 2014 - 7:30 pm

    Rather than relying on endpoint security alone, Gartner recommends businesses balance their investment across all four phases of the Gartner adaptive security architecture: predict, prevent, detect, and respond.
  • White Paper

    Defining Next-Generation Network Intrusion Reprint

    Posted September 12, 2014 - 7:30 pm

    New research from Gartner says evolving threats mandate a new approach to intrusion prevention. That's why Gartner has placed HP TippingPoint in the leaders quadrant of their Magic Quadrant for IPS nine years in a row.
  • White Paper

    Security Considerations When Undergoing a Network Refresh

    Posted September 12, 2014 - 7:30 pm

    This SlashGuide looks at the most important factors IT should keep top of mind as they plan their move to 802.11ac, higher bandwidth wired infrastructure or upgrading to switches and routers with enhanced capabilities.
  • HP unit pleads guilty to bribing Russian officials

    Posted September 12, 2014 - 4:55 pm

    A subsidiary of Hewlett-Packard has admitted violating the U.S. Foreign Corrupt Practices Act by bribing Russian officials to win a contract with the Office of the Prosecutor General of the Russian Federation.
  • VMware and Cisco patch vulnerabilities in data-center gear and software

    Posted September 12, 2014 - 2:05 pm

    VMware and Cisco Systems released security fixes this week for serious vulnerabilities in networking virtualization and server software typically used in data centers.
  • White Paper

    A Cybercriminal's Guide to Exploiting DNS for Fun and Profit

    Posted September 12, 2014 - 10:46 am

    Stories about devastating cyberattacks are plaguing the news. Why? The DNS protocol is easy to exploit. See your network the way hackers do--as an easy target. Learn how you can effectively secure your DNS infrastructure today.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Join today!

See more content
Ask a Question