It's Not Easy to Determine Costs of Data Breach

Determining costs of a data breach is a complicated, but important, exercise. It may help convince executives to increase security spending.

If there's anything positive to come out of the catastrophic breach of Sony Picture Entertainment's network last year, it's that the case helps illustrate the true cost of a major security incident. That's … more »

Cisco Security Report Shows Importance of User Education

Fighting malvertising attacks and other tricky exploits is nearly impossible without user education, notes a Cisco security researcher.

Google Pays Big Bug Bounties in Chrome 40 Fix

Google pays out $88,500 in bug bounties, with the largest browser security update yet in 2015. In all, Google fixed 62 different security flaws.

Containerization and the Dawn of Bring Your Own Security

Containerization holds the promise of helping organizations securely move their applications to the cloud.

Startup Spotlight: ThreatStream's Threat Intelligence Platform

Getting customers to share information with each other is a key part of ThreatStream's new spin on threat intelligence, a platform called Optics.

EMV Is No Payment Security Panacea

Implement EMV and you eliminate payment card fraud, right? Wrong.

How Secure Is Android if Google Won't Patch?

A security researcher alleges that Google won't patch its older Android software for a new vulnerability. Luckily, users have options to boost security for older versions of the OS.