BSIMM's Data-driven Approach to Software Security

The Building Security in Maturity Model's sixth edition features recommendations gleaned from software security practices of more than 100 companies.

Data-driven enterprise security professionals will find much to like in the sixth edition of the Building Security in Maturity Model (BSIMM), a software security measurement tool. Nine firms provided information … more »

The Health Care Data Hacking Problem

Health care data hacking is lucrative for criminals and often tough to detect, which is making it a tough problem to solve.

Can Mobile Apps Defend Themselves? Yes, Says Bluebox

Bluebox's approach goes beyond providing just a security wrapper for mobile applications.

Is Jailbreaking Apple Devices Always a No-No?

Apple and enterprise IT teams discourage jailbreaking Apple devices – and with good reason. But is jailbreaking always a bad thing?

Docker Container Security: What's Next

Docker aims to improve container security with application scanning, user namespaces and other capabilities.

All about Authentication, Apps for Nymi

Canadian startup Nymi is building a developer ecosystem for its biometric authentication technology.

Adobe Patches 17 Flash Vulnerabilities in Latest Update

Adobe's Flash is still heavily favored as a top attack vector, so you'd better update ASAP.