New & Notable
Application security and data protection News
October 10, 2014
Partners respond to the news that Symantec will split into two separate companies.
July 11, 2014
IronKey by Imation launches its new channel program, adding a Platinum tier for partners with Microsoft certifications; Netsocket broadens its Virtual Partner Program to include software developers; more news.
May 01, 2014
Microsoft's out-of-band patch for the 'use-after-free' IE zero day offered a fix for Windows XP, which is now being actively targeted.
April 28, 2014
The IE zero-day, first spotted by FireEye, is being actively exploited in the wild. US-CERT recommends avoiding IE until a fix is released.
Application security and data protection Get Started
Bring yourself up to speed with our introductory content
A virtual honeypot is software that emulates a vulnerable system or network to attract intruders and study their behavior. Virtual honeypots contrast with hardware-based honeypots, which are dedicated computers, networks or network segments designed... Continue Reading
Video: An expert says the NIST cybersecurity framework and encryption standards resulted from a thorough public vetting process. Continue Reading
In this FAQ, learn how new standards under PCI DSS 3.0 are changing the approach of businesses to payment card security and regulatory compliance. Continue Reading
Evaluate Application security and data protection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Soon enough, Washington will take on the issues surrounding the offshoring of healthcare data, says technology and security consultant Kevin McDonald. Continue Reading
In this video, Cryptography Research president and SSL 3.0 co-creator Paul Kocher reflects on SSL's history and Apple's recent SSL security snafu. Continue Reading
Enterprises consider WebRTC security as the WebRTC standard nears completion, as well as how to protect their networks from new vulnerabilities. Continue Reading
Manage Application security and data protection
Learn to apply best practices and optimize your operations.
Software architecture risk analysis doesn't have to be hard. Gary McGraw and Jim DelGrosso discuss an easier, more scalable process. Continue Reading
Internet Explorer 11 offers few new security features. So, has Web browser security technology reached its peak? Michael Cobb details IE 11 security. Continue Reading
Expert Joe Granneman explains how to protect corporate data after leaks divulge information on NSA Bullrun and other government surveillance programs. Continue Reading
Problem Solve Application security and data protection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Application security expert Michael Cobb discusses the risks of Web browser extensions and what enterprises can do to counter browser plug-in threats. Continue Reading
How to secure your computer amidst rampant cyberthreats? Robert Bigman, a former CISO at the CIA, discusses computer privacy as a top tech challenge. Continue Reading
End users get a more functional archive when you implement Exchange Online Archives -- and you don't have to maintain infrastructure to support it. Continue Reading