Hadoop Security Still Evolving

While organizations' use of Hadoop has become more sophisticated, associated security practices have not kept pace.

When it comes to security, what does it take to make Hadoop "enterprise ready?" It may seem like a strange question because the open source Big Data processing system is clearly an enterprise tool. So … more »

Google Hit Again by Unauthorized SSL/TLS Certificates

The SSL/TLS certificate authority system's frailty is again exposed, as an unauthorized certificate is issued for Google.

Will 2015 Be Adobe Flash's Swan Song?

Following more critical zero-day exploits, Adobe's Flash platform's place in the enterprise appears as unsecure as the software itself.

Insecure Mobile Apps a Big Problem

IBM-sponsored research shows mobile app development is flawed. Big Blue now offers a new platform to help.

IBM: Over a Billion Records Leaked in 2014

A surprising 40 percent of attacks in IBM's X-Force report were listed as 'unknown.'

Making the Case for Security Investment

Annual security risk assessments and meaningful metrics are among the tools infosec pros can use when asking senior decision-makers to increase budgets.

10 Tips to Mitigate Data Breaches

We include a list of vendors that offer solutions that can help improve your response to security threats and data breaches.