Third-Party Vendors a Weak Link in Security Chain

Security shortcomings of third-party vendors are a cybercriminal's dream. So security pros should revisit how they manage vendor relationships.

Credit card data of 40 million Target customers, 15,000 Boston Medical Center patients’ personal information, and payment card information of 868,000 Goodwill customers – all of this information … more »

Mobile Payment Fraud a Growing Problem: LexisNexis

Mobile commerce is a prime target for payment fraud, thanks to its novelty and complexity, according to a recent LexisNexis report.

Web Application Firewalls: Next Big Thing in Security

Web application firewalls, an especially critical component of enterprise security, are even more effective when combined with other emerging security technologies.

6 Tips for Developing Secure IoT Apps

Most IoT systems contain security vulnerabilities that can be exploited by hackers, a recent study found, highlighting the importance of developing secure IoT apps.

How Much Does Business AV Cost? Try Free

Avast debuts free Business Anti-Virus, but what's the catch?

3 Questions Every CISO Should Answer

FireEye's Kevin Mandia has a few key questions for CISOs.

Why All Linux (Security) Bugs Aren't Shallow

With Heartbleed and Shellshock, the open source community realized that Linus' law can be challenged.