Today's Top 5 Malware Threats

To fight malware, security teams must understand it. Here are five especially nasty forms of malware.

By Nazar Tymoshyk, SoftServe Today attackers are not being held back by anything, and malicious software is still a surprisingly common issue around the world. No wonder that more and more IT and business … more »

IBM Boosts Cloud Data Protection, Compliance

IBM has patented an invention that will help global businesses navigate complex regulatory landscape for cloud data.

Apple Pay: How Secure Is It?

Apple Pay and other emerging mobile payment methods like Google Wallet possess potential security vulnerabilities, yet they are more secure than credit cards.

Microsoft Buys Aorato to Boost Active Directory Security

Microsoft buys Aorato, the company that earlier this year disclosed a critical vulnerability in Microsoft's security.

Startup Spotlight: Security-as-a-Service Bitglass

While most cloud security startups focus on securing cloud infrastructure, Bitglass protects data traveling between corporate networks and SaaS applications.

The Internet of Things: 3 Security Requirements

As the Internet of Things proliferates, so too do IoT-based vulnerabilities and attacks. These three tips will help secure your IoT-enabled network.

Is Shellshock a Feature, not a Bug?

The Shellshock flaw highlights a major security issue. Software created before mass adoption of the Internet is highly susceptible to today's security risks.