7 Database Security Best Practices

Database security has never been more important, given the high value hackers place on data. These database security best practices will help protect your data.

Databases - by definition - contain data, and data such as credit card information is valuable to criminals. That means databases are an attractive target to hackers, and it's why database security is … more »

Should Enterprise Security Software Be under Warranty?

Should enterprise security software offer warranties, much as consumer products and services do?

Using a Neural Network to Improve Social Spear Phishing

Researchers from ZeroFox build a tool that employs neural networks to trick unsuspecting Twitter users.

How to Hide Malware with a Digitally Signed Executable

Deep Instinct reveals flaw that could potentially enable a security certificate bypass in Microsoft applications.

How DevSecOps Will Change Security

DevSecOps will become a common thread in every enterprise security approach, opines Mike Kail, co-founder and chief innovation officer of Cybric.

How to Mitigate Fourth-Party Security Risks

What do you know about your vendors' vendors? Fourth-party security risks can be serious. How can you mitigate them?

DARPA's Machine Challenge Solves CrackAddr Puzzle

Mike Walker, the DARPA program manager responsible for the Cyber Grand Challenge, details how autonomous systems solved a decade-old security challenge. [VIDEO]