How to Minimize Enterprise File Sharing Risks

File sharing and sync (FSS) services like Dropbox can expose sensitive corporate data. Luckily, there are enterprise-grade FSS alternatives.

Since the days of the floppy disk, users have tried to piece together convenient ways to share files between one another. Every system seemed sloppy in its own way. Email was the first file exchange platform, … more »

New ThreatStream CEO Wants to Solve SIEM Challenge

ArcSight founder joins security vendor to fill gaps that SIEM doesn't solve.

Hackers Target Browsers, Especially IE: Bromium Labs

Hackers targeted Microsoft's Internet Explorer with an emerging attack technique called action script spray in the first half of 2014, say Bromium Labs researchers.

How Microsoft Handles BYOD

While BYOD still worries infosec pros, vendors like Microsoft are easing concerns by offering authentication and management capabilities.

Google Project Zero Focuses on Internet Security

Months after reporting its first vulnerabilities, Google officially acknowledges the existence of a shadowy security group known as Project Zero.

Are TrueCrypt Users Screwed?

When developers of the TrueCrypt disk encryption program warned the open source project was insecure, it left users hanging. Fortunately, there are TrueCrypt alternatives.

How to Reduce Use-After-Free Memory Risk

Use-after-free memory errors often crop up in software application code.