Selecting a Threat Risk Model for Your Organization, Part Two

In the second of a two-part series on threat risk models, we look at Trike, MIL-STD-882E and OCTAVE.

No threat risk model (an assessment of software, network or other risks and threats) is complete without a methodology for rating threats. In an earlier article we addressed two common and simple threat … more »

Startup Spotlight: Cymmetria's Cyber Deception Technology

Cymmetria's cyber deception technology turns the tables on bad guys by luring them to decoys where users can track their lateral movements.

Which Threat Risk Model Is Right for Your Organization?

Which threat risk model is right for you? We compare strengths and weaknesses of three popular ones: STRIDE, DREAD and CVSS.

3 Cases of InfoSec Hubris That Led to Big Breaches

Hacks happen. But sometimes organizations seem to make themselves targets with behavior that is a bit too boastful, judgmental or egotistical.

How Symantec's New COO Measures Security Success

Mike Fey, president and COO of Symantec, talks about how he will bring the former Blue Coat and Symantec teams together. [VIDEO]

Mac Malware Part of Worsening Security Picture

While Mac malware is not as big of a problem as attacks meant for Windows, hackers are targeting Apple operating systems more than ever before.

How to Protect Bank Cards in E-Commerce Apps

Rapid growth of e-commerce applications mean security is sometimes lacking. How can developers secure e-commerce apps?