Articles by Sean Michael Kerner 

HackerOne Continues to Grow Bug Bounty Business [VIDEO]

Alex Rice, co-founder and CTO of HackerOne, discusses how his firm is growing the bug bounty model.

LightCyber Shines a Light on Real Threats [VIDEO]

Gonen Fink, CEO of LightCyber, explains how his firm's technology helps solve  a key missing piece of the security alert mystery.

Pwnie Express CEO Riding Ahead Into the Enterprise [VIDEO]

Paul Paget, CEO of Pwnie Express, discusses how his company is evolving to meet the next generation of threats and what is driving the business forward.

Threat Stack Goes Slack For Chat Ops Security

PODCAST: Threat intelligence is great, but will getting actionable alerts over Slack improve enterprise security?

Skyport Systems Funding Tops $67M to Build Secure Servers

New $30 million funding round for security startup Skyport Systems includes participation of Google Ventures.

Organizations Lack Visibility into Application Security

Ponemon Institute study sponsored by IBM reveals application security shortcomings.

IDC: Specialized Threat Analysis Is Hot

Fear and loathing of advanced persistent threats (ATPs) is creating a market for what IDC calls specialized threat analysis and protection.

How Mature is Your Vulnerability Coordination?

VIDEO: Katie Moussouris, chief policy officer at HackerOne, discusses the Vulnerability Coordination Maturity Model.

RSA: Verizon Discusses Roman Holiday in Data Breach Digest

 VIDEO: Bryan Sartin, managing director, the RISK Team, Verizon, discusses the new Verizon Breach Digest.

Apple vs. FBI: Even Cryptographers Cannot Agree

Even world famous cryptographers don't all agree with Apple's position on protecting encrypted data.

How to Hire Security Pros Like a Hacker: RSA

Digital Shadows takes a look at how hackers recruit and finds some lessons learned for enterprises.

Cloud Security Alliance Takes Aim at Next Generation Cloud

Cloud Security Alliance announces a new global advisory board and starts guidance for security-as-a-service and NFV offerings.

IBM Buys Resilient Systems for Incident Response

Famous security expert Bruce Schneier will join IBM as part of Big Blue's acquisition of incident response specialist Resilient Systems.

Devices Running Insecure Software: Study

Study of two million devices reveals that more than half are running outdated, vulnerable software.

Smart Buildings, Not So Smart Security? [PODCAST]

Smart buildings have some IoT security issues, finds IBM X-Force Security research.

4 Trends Drive FireEye Security Revenue Growth

Growing cybersecurity risk and complexity mean more business opportunity, says FireEye CEO.

PatternEx Debuts Virtual Analyst Platform for Security [PODCAST]

Uday Veeramachaneni, co-founder and CEO of PatternEx, discusses how his security startup aims to solve a security staffing challenge.

FinalCode 5 Takes Aim at File Encryption Challenge [PODCAST]

Scott Gordon, chief operating officer of Final Code, discusses the challenges of file encryption and what his company's new technology is all about.

Carrier Pre-Loads Expand Keeper's Mobile Password Footprint

Mobile password manager app continues to expand user base, thanks to new carrier partnerships.

How to Set up a Successful Bug Bounty Program [VIDEO]

What does it take to run a successful bug bounty program?

Software Defined Networking (SDN) = Security [VIDEO]

Software defined networking enhances security by creating micro-segmented networks that can provide isolation and limit the impact of data breaches.

UMass Masters Cyber Security Education

As threats mount, so too does the need for improved cyber security education.

Shevirah Moving Forward for Enterprise Mobile Pen Testing [VIDEO]

Security innovator Georgia Weidman discusses what her new startup is doing to help enterprise mobile security.

Can Mobile Apps Defend Themselves? Yes, Says Bluebox

Bluebox's approach goes beyond providing just a security wrapper for mobile applications.

Docker Container Security: What's Next

Docker aims to improve container security with application scanning, user namespaces and other capabilities.