6 Tips for Developing Secure IoT Apps

Most IoT systems contain security vulnerabilities that can be exploited by hackers, a recent study found, highlighting the importance of developing secure IoT apps.

Many Internet of Things (IoT) systems are so riddled with security vulnerabilities that they can easily be compromised by hackers. That's the alarming conclusion of a recent study carried out by HP. It … more »

How Much Does Business AV Cost? Try Free

Avast debuts free Business Anti-Virus, but what's the catch?

3 Questions Every CISO Should Answer

FireEye's Kevin Mandia has a few key questions for CISOs.

Why All Linux (Security) Bugs Aren't Shallow

With Heartbleed and Shellshock, the open source community realized that Linus' law can be challenged.

Google Blinks on Project Zero Security Disclosure

Common sense prevails as Google relaxes its 90-day disclosure policy for zero-day security vulnerabilities.

Risk Assessments: What You Need to Know

Why are information security risk assessments so important, and how can you make sure you get an effective assessment?

5 Lessons Learned from Anthem Data Breach

Anthem's recent data breach reveals some things Anthem did right – and some it did wrong. Other enterprises can learn from its actions.