dcsimg

Articles by Paul Rubens 

What Are Your Container Security Options?

As with any nascent technology, container security is a concern. Three initiatives can help organizations boost container security.

Are There Open Source Vulnerability Assessment Options?

Though some early open source vulnerability assessment tools went the proprietary route, you do still have open source options.

Open Source Software's Role in Breach Prevention and Detection

While proprietary vendors dominate the breach prevention and detection market, open source software plays a key role.

5 Big Improvements in Wireshark

It's now even easier to use the open source Wireshark tool to analyze network traffic at the packet level, thanks to a recent upgrade.

5 Key New Features in Nmap Network Security Tool

The open source network security tool's latest version offers significant improvements.

Is Jailbreaking Apple Devices Always a No-No?

Apple and enterprise IT teams discourage jailbreaking Apple devices – and with good reason. But is jailbreaking always a bad thing?

TrueCrypt Travails Continue

Two serious bugs later, almost no one thinks it is a good idea to use TrueCrypt. But what are your options?

Unlocking Smartphones: PINs, Patterns or Fingerprints?

PINs, patterns and fingerprints are all options for unlocking mobile devices. But which option is most secure?

Do APIs Pose a Security Risk?

APIs offer a new and powerful attack vector for hackers. Fortunately, API management products can help organizations boost their API security.

Cyber War Is Hell

Think cyber war is bad now? It is only going to get worse – much worse -- says security expert Bruce Schneier.

Why Is Fighting Cybercrime So Hard?

It's tough to target the few hundred super hackers that experts believe are behind the majority of cyber attacks.

Static Analysis Can 'Score' Software Security

Static analysis can be even more effective in improving software security if it is used to create quality metrics.

Windows Server 2003: No Support, No Security?

What are your options, if any, for mitigating security risks of continuing to run Windows Server 2003 after Microsoft ends extended support in July?

Do Threat Exchanges Work?

Sharing intelligence on security threats is an old idea getting new cred, thanks to Facebook's new Threat Exchange. But how well do such exchanges work?

Hadoop Security Still Evolving

While organizations' use of Hadoop has become more sophisticated, associated security practices have not kept pace.

6 Tips for Developing Secure IoT Apps

Most IoT systems contain security vulnerabilities that can be exploited by hackers, a recent study found, highlighting the importance of developing secure IoT apps.

It's Not Easy to Determine Costs of Data Breach

Determining costs of a data breach is a complicated, but important, exercise. It may help convince executives to increase security spending.

10 Tips for Secure Business Travel

Business travelers are an attractive target for hackers. Here's how to protect yourself when you are on the road.

The Trouble with Tor

Confidence that Tor can reliably provide users with anonymity on the Internet has been shattered, thanks to recent revelations. Tor alternatives do exist, however.

Apple Pay: How Secure Is It?

Apple Pay and other emerging mobile payment methods like Google Wallet possess potential security vulnerabilities, yet they are more secure than credit cards.

Is Shellshock a Feature, not a Bug?

The Shellshock flaw highlights a major security issue. Software created before mass adoption of the Internet is highly susceptible to today's security risks.

Passwords Not Going Away Any Time Soon

While biometric authentication and other password alternatives abound, traditional passwords remain the go-to method of authentication due to low cost.

Mobile Device Management Not Just for Big Companies

While mobile device management is often found at companies with big workforces, it can also help small companies with their mobile initiatives.