Apple vs. Android: Mobile Security Pros and Cons

Both Apple's iOS and Android have security strengths and weaknesses, experts say.

Just like the BetaMax and VHS video wars of a few decades ago, there are staunch proponents and loyal users of Android and iOS (Apple)-based products. But unlike videocassettes and recorders, Android and … more »

5 Ways to Make Public Cloud More Secure

As their use of public cloud grows, organizations must ensure they are doing all they can to achieve a secure cloud environment.

How LinkedIn Scales Security [VIDEO]

Cory Scott, director of Information Security at LinkedIn, discusses how the business social network manages security even with a small team.

10 Free or Cheap WiFi Security Testing Tools

Do not kid yourselves, security professionals. You need more than one WiFi security testing tool. Here are 10 free or inexpensive options.

Why Microsoft Wants to Improve Open Source Security [VIDEO]

Mark Cartwright, group program manager at Microsoft, discusses the intersection between the Security Development Lifecycle and open source software.

How to Choose the Right Security Testing Tool

Picking the right tool is a critical part of application security.

Can Sharing Threat Intelligence Prevent Cyberattacks?

The Obama administration and some in the private sector believe sharing threat information can help thwart cyberattacks. But not everyone is convinced.