APIs offer a new and powerful attack vector for hackers. Fortunately, API management products can help organizations boost their API security.
Think cyber war is bad now? It is only going to get worse – much worse -- says security expert Bruce Schneier.
It's tough to target the few hundred super hackers that experts believe are behind the majority of cyber attacks.
Static analysis can be even more effective in improving software security if it is used to create quality metrics.
What are your options, if any, for mitigating security risks of continuing to run Windows Server 2003 after Microsoft ends extended support in July?
Sharing intelligence on security threats is an old idea getting new cred, thanks to Facebook's new Threat Exchange. But how well do such exchanges work?
While organizations' use of Hadoop has become more sophisticated, associated security practices have not kept pace.
Most IoT systems contain security vulnerabilities that can be exploited by hackers, a recent study found, highlighting the importance of developing secure IoT apps.
Determining costs of a data breach is a complicated, but important, exercise. It may help convince executives to increase security spending.
Business travelers are an attractive target for hackers. Here's how to protect yourself when you are on the road.
Confidence that Tor can reliably provide users with anonymity on the Internet has been shattered, thanks to recent revelations. Tor alternatives do exist, however.
Apple Pay and other emerging mobile payment methods like Google Wallet possess potential security vulnerabilities, yet they are more secure than credit cards.
The Shellshock flaw highlights a major security issue. Software created before mass adoption of the Internet is highly susceptible to today's security risks.
While biometric authentication and other password alternatives abound, traditional passwords remain the go-to method of authentication due to low cost.
While mobile device management is often found at companies with big workforces, it can also help small companies with their mobile initiatives.
A fork of TrueCrypt's code, VeraCrypt strengthens the open source encryption software's transformation process and addresses other weaknesses.
TrueCrypt will stay alive, thanks to devotees who are forking the encryption program's code. 'Cleaned up' code will get a new name, CipherShed, and a different open source license.
Israeli security startup ThetaRay promises to detect zero-day attacks, hidden APTs and other threats in seconds by simultaneously analyzing all security and operational data sources.
Massachusetts' Needham Bank enjoys a bevy of benefits thanks to its mobile device management system.
Experts believe the Internet of Things will be highly insecure, at least in the early days.
Mobile device management (MDM) can help enterprises minimize security risks associated with BYOD. Here is what you need to know if you plan to purchase an MDM system.
When developers of the TrueCrypt disk encryption program warned the open source project was insecure, it left users hanging. Fortunately, there are TrueCrypt alternatives.
Hackers are increasingly using DDoS attacks as a kind of 'smokescreen' that helps them carry out data breaches.
Anti-malware software can't spot all malicious code. Is isolating end-user tasks through virtualization a better approach to security?
A managed security service provider (MSSP) is a good option for cloud security, say experts.
- Jul 2015
- Jun 2015
- May 2015
- Apr 2015
- Mar 2015
- Feb 2015
- Jan 2015
- Dec 2014
- Nov 2014
- Oct 2014
- Sep 2014
- Aug 2014
- Jul 2014
- Jun 2014
- May 2014
- Mar 2014
- Feb 2014
- Jan 2014
- Dec 2013
- Nov 2013
- Aug 2013
- Jun 2013
- Apr 2013
- Mar 2013
- Feb 2013
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Feb 2010
- Dec 2008
- Apr 2007
- Nov 2004
- Sep 2004
- Aug 2004
- Jul 2004
- Dec 2003
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?