Sharon Shea Executive Editor - TechTarget - SearchSecurity SearchSecurity Data breach consequences: Get breached, make money? 27 Feb 2015 SearchSecurity Maintaining vendor trust proves tough for Lenovo, Microsoft 20 Feb 2015 SearchSecurity Security information sharing: A double-edged sword 13 Feb 2015 SearchSecurity Budget, breach law highlight growing federal cybersecurity awareness 06 Feb 2015 SearchSecurity Will YouTube HTML5 transition mean the end of Flash security issues? 30 Jan 2015 SearchSecurity Patchapalooza: In 2015, software patches, software security flaws surge 23 Jan 2015 SearchSecurity Hardware security issues prove tough to find, harder to fix 16 Jan 2015 SearchSecurity Light January 2015 Patch Tuesday delivers one critical Windows fix 13 Jan 2015 SearchSecurity Sony Pictures hack recap: Experts debate North Korea's role 09 Jan 2015 SearchSecurity Sony Pictures hacking back: The ethics of obfuscation 12 Dec 2014 SearchSecurity Encryption everywhere: Debating the risks and rewards 21 Nov 2014 SearchSecurity Are offensive hacking courses ethical? Debating the ethics of hacking 10 Oct 2014 SearchSecurity Palo Alto NGFW fails NSS Labs report, war of words ensues 03 Oct 2014 SearchSecurity Rogue IMSI catchers heighten enterprise cell phone security risks 19 Sep 2014 SearchSecurity Goodwill breach highlights need for service provider due diligence 05 Sep 2014 SearchSecurity identity governance 25 Aug 2014 SearchSecurity OpenAppID 12 Aug 2014 SearchSecurity Voice recognition: Can you hear me now? 06 Aug 2014 SearchSecurity Iris authentication: What is your eye-dentity? 06 Aug 2014 SearchSecurity Smart TV, smart boxes, smart remote -- smart mouse? 06 Aug 2014 SearchSecurity Two-factor authentication devices: One key to rule them all 06 Aug 2014 SearchSecurity BYOB: Bring your own biometric key fob, that is 06 Aug 2014 SearchSecurity Password problems plaguing you? FIDO Alliance hopes to have the answers 06 Aug 2014 SearchSecurity Too old for fingerprint authentication? Think again 06 Aug 2014 SearchSecurity Secure element, secure NFC, secure mobility 06 Aug 2014 SearchSecurity Secure automatic login; just swipe your finger 06 Aug 2014 SearchSecurity FIDO authentication for Windows, Linux and Android 06 Aug 2014 SearchSecurity Beyond passwords and PINs: Fingerprint sensors for the mobile age 06 Aug 2014 SearchSecurity Can a fingerprint sensor make a smartphone smarter? 06 Aug 2014 SearchSecurity antispoofing 17 Jul 2014 SearchSecurity domain generation algorithm (DGA) 07 Jul 2014 SearchSecurity address space layout randomization (ASLR) 23 Jun 2014 SearchSecurity United States Secret Service (USSS) 02 Jun 2014 SearchSecurity TrueCrypt 02 Jun 2014 SearchSecurity cardholder data environment (CDE) 19 May 2014 SearchSecurity cardholder data (CD) 19 May 2014 SearchSecurity proxy firewall 16 May 2014 SearchSecurity Verizon VERIS (Vocabulary for Event Recording and Incident Sharing) Framework 01 May 2014 SearchSecurity Verizon Data Breach Investigations Report (DBIR) 01 May 2014 SearchSecurity Heartbleed 15 Apr 2014 SearchSecurity Robert Morris worm 03 Apr 2014 SearchSecurity Microsoft Security Essentials (MSE) 02 Apr 2014 SearchSecurity Microsoft Enhanced Mitigation Experience Toolkit (EMET) 21 Mar 2014 SearchSecurity incident response plan (IRP) 20 Feb 2014 SearchSecurity BYOI (bring your own identity) 17 Feb 2014 SearchSecurity inline network device 14 Feb 2014 SearchSecurity Kaptoxa 03 Feb 2014 SearchSecurity Rescator 03 Feb 2014 SearchSecurity micro VM (micro virtual machine) 30 Jan 2014 SearchSecurity SSL checker (secure socket layer checker) 03 Jan 2014 SearchSecurity madware 19 Dec 2013 SearchCloudSecurity CloudTrust Protocol (CTP) 17 Dec 2013 SearchSecurity mandatory access control (MAC) 02 Dec 2013 SearchSecurity USGCB (United States Government Configuration Baseline) 22 Nov 2013 SearchSecurity CSR (Certificate Signing Request) 18 Nov 2013 SearchCloudSecurity Big data monitoring: Even the best fall down sometimes 04 Nov 2013 SearchCloudSecurity Don't let untrustworthy workers hinder big data privacy 04 Nov 2013 SearchCloudSecurity Big data security, big data privacy issues, big decisions 04 Nov 2013 SearchCloudSecurity Sick from input: A three-step cure for insecure data collection 04 Nov 2013 SearchCloudSecurity Anything but meta: Planning for data provenance 04 Nov 2013 SearchCloudSecurity Who needs cloud application security? Instead, secure big data 04 Nov 2013 SearchCloudSecurity Getting 'granular' with big data access audits 04 Nov 2013 SearchCloudSecurity Avoiding privacy disclosures: Keep big data from prying eyes 04 Nov 2013 SearchCloudSecurity Auto-tiering storage: Do you know where your data is? 04 Nov 2013 SearchCloudSecurity The three problems with big data access control 04 Nov 2013 SearchCloudSecurity NoSQL security = No security? 04 Nov 2013 SearchSecurity Security Bytes 30 Jan 2009 1 2 3