Outsourcing: Understanding the business risks: In this Ask the Expert Q&A Shon Harris, our security management expert reviews business risks associated with outsourcing security jobs to developing countries and learn how security managers can reduce these risks.
Vendors are hurriedly implementing a new patch released over the weekend for the 'Shellshock' Bash vulnerability, but researchers have since found more Bash flaws that will likely need prompt remediation.
Malvertising is already being used by attackers as a delivery mechanism for exploit kits, and new research reveals the problem is likely to get worse, specifically in the form of malicious Flash banners.
Implementing data encryption controls in a cloud environment can be quite challenging for organizations using those services. Ed Moyle discusses the first two steps to implementing data security in the cloud.