endpoint security - News, Features, and Slideshows

News

  • How we tested vulnerability analyzers

    We developed a test methodology and evaluation criteria in six main areas, including results reporting, product controls and manageability, scan results, vulnerability workflow features, interoperability, and updates and protocol support.

    Joel Snyder | 20 Jun | Read more

  • Top 10 network vulnerabilities inside the network

    Today's state-of-the-art network security appliances do a great job of keeping the cyber monsters from invading your business. But what do you do when the monster is actually inside the security perimeter? Unfortunately, all of the crosses, garlic, wooden stakes and silver bullets in the world have little effect on today's most nefarious cyber creatures. Here are the top 10 ways your network can be attacked from inside and what you can do to insure your business never has to perform an exorcism on your servers.

    Derek Manky, project manager at Fortinet's FortiGuard center | 09 Nov | Read more

  • PCI security group speaks out on encryption

    The organization in charge of defining security for the payment-card industry's merchants and service providers Tuesday issued two guidance papers, the first on end-to-end encryption and the second on payment card technology used more commonly in Europe than the United States.

    Ellen Messmer | 06 Oct | Read more

  • Meeting the new PCI wireless requirements

    Beginning Sept. 30, Visa will require merchants and related businesses to conduct wireless security scans to prove compliance with version 1.2 of the PCI Data Security Standard (PCI DSS) which is designed to safeguard cardholder data from wireless threats.

    Ajay Kumar Gupta | 25 Sep | Read more