Phishing Attacks: Not Sophisticated, but Successful

While companies spend big bucks on combating advanced malware, users still fall prey to email phishing scams.

Companies spend countless millions of dollars in attempts to protect themselves against the newest worms, Trojans and other malware. But perhaps even more dangerous are slight variations on some of the … more »

Hadoop Security Still Evolving

While organizations' use of Hadoop has become more sophisticated, associated security practices have not kept pace.

3 Bad Security Habits that Make CISOs Crazy

Every CISO can relate to these bad security habits found in most organizations. But what can CISOs do to change them?

Google Hit Again by Unauthorized SSL/TLS Certificates

The SSL/TLS certificate authority system's frailty is again exposed, as an unauthorized certificate is issued for Google.

Will 2015 Be Adobe Flash's Swan Song?

Following more critical zero-day exploits, Adobe's Flash platform's place in the enterprise appears as unsecure as the software itself.

Insecure Mobile Apps a Big Problem

IBM-sponsored research shows mobile app development is flawed. Big Blue now offers a new platform to help.

IBM: Over a Billion Records Leaked in 2014

A surprising 40 percent of attacks in IBM's X-Force report were listed as 'unknown.'