dcsimg

Articles by Sean Michael Kerner 

How LinkedIn Scales Security [VIDEO]

Cory Scott, director of Information Security at LinkedIn, discusses how the business social network manages security even with a small team.

Why Microsoft Wants to Improve Open Source Security [VIDEO]

Mark Cartwright, group program manager at Microsoft, discusses the intersection between the Security Development Lifecycle and open source software.

Using Passive DNS to Fight Cybercrime

Going after bad guys can lead to unintended Internet collateral damage, but Paul Vixie has some ideas on limiting the risk with DNS.

HP on Legal Hacking and the Law

HP's Zero Day Initiative buys a lot of security vulnerabilities from researchers – so how does it stay within the bounds of the law?

RFID Susceptible to Cloning, Other Hacks

As RFID usage grows, so too do tools to clone and abuse RFID signals.

FBI Details Takedown of Gameover Zeus Botnet

FBI agent explains how law enforcement worked with security vendors to bring down a major botnet operation.

HP ZDI Finds 100 Vulnerabilities in Adobe Reader

HP details how an attacker could potentially abuse Adobe Reader's JavaScript APIs.

Certifigate Flaw Exposes Android Users to Risk [VIDEO]

Remote diagnostic tools from OEMs that are supposed to help Android users, could instead be used to hurt them.

Black Hat Car Hackers Did It as a Hobby [VIDEO]

Hacking a Jeep wasn't part of their day jobs, explain Charlie Miller and Chris Valasek.

Google Doubles Down on Android Security at Black Hat

Google's Android security chief discusses Stagefright and more in Black Hat address.

Man in the Cloud Attack Leverages SaaS Vulnerability

Attackers could use SaaS service synchronization to steal your enterprise data.

Ziften Digs Deep for Security Visibility

Fresh off a $24 million funding round, security startup debuts ZFlow technology to connect the dots of security incidents.

Flash Malware Surges, Finds Cisco

While Flash exploits are up, Java is going the other way, according to Cisco's MidYear Security Report.

Google Chrome 44 Updates for 43 Vulnerabilities

Google pays out $39,674 in awards to researchers for disclosing web browser vulnerabilities.

Farsight Security Takes DNS Insights to Improve Security [VIDEO]

Paul Vixie, CEO of Farsight Security, discusses how his firm uses DNS and other network traffic information to help organizations with security forensics.

Cloud More Secure than OnPrem, Says Amazon CTO

Moving to the cloud is the best way an organization can improve security and compliance, insists Amazon CTO Werner Vogels.

How IKEA Does PCI-DSS

Attaining PCI-DSS compliance is no easy task, but IKEA's common sense approach makes it a bit less taxing.

Will Red Hat Enter the Security Market?

VIDEO: Red Hat CEO Jim Whitehurst discusses the role that security plays at the Linux vendor and whether it's a business he plans on entering with a new product.

Exabeam Advances User Intelligence Security Efforts

Exabeam 1.7 makes use of stateful user tracking to keep user credentials in line.

Most Secure Password? It Will Surprise You [VIDEO]

A seven character password with special characters can be hacked in less than three minutes.

TapLink Rethinks Password Security with Blind Hashing

Passwords are often a weak security link but they don't have to be, says security startup TapLink.

76 Percent of Organizations Breached in 2014

QuinStreet Enterprise research outlines the scope of security challenges facing enterprises today.

Google, Facebook and Microsoft on Data Privacy

Data privacy should be integrated at the beginning of product development process, tech titans agree.

IoT 'Security Hopscotch' Is No Game: Chris Roberts

Chris Roberts, in hot water after tweeting about a hack into a plane's WiFi system, describes another theoretical attack, this one against an Internet-connected appliance.

What Bruce Schneier Learned from the Sony Breach

Bruce Schneier provides guidance for organizations in the post-Sony breach world.