Articles by Sean Michael Kerner 

How to Limit Heartbleed Risk Today

What can you do to reduce your risk from Heartbleed? eSecurity Planet has got you covered.

ATMs on Windows XP: How Risky Is It?

Microsoft has ended official support for Windows XP. What does that mean for the security of the world's ATMs, most of which run XP?

Does Your Organization Need a Chief Trust Officer? [VIDEO]

VIDEO: Is Cognitive Injection the Key to Real Security?

Andy Ellis, chief security officer at Akamai, thinks that taking a positive approach to security tasks will result in better security outcomes.

VIDEO: Bruce Schneier on Incident Response and His Next Book

Bruce Schneier explains the role that incident response technology should play in the modern IT security landscape.

Touchlogging Represents a Real Mobile Risk

Trustwave researcher warns about the risk of touchlogger applications on IOS and Android

Can Cloud Services be Exploited to Aid Attackers?

Researchers reveal how they can leverage free cloud services as an efficient attack platform without spending any money.

Inside the U.S Department of Homeland Security's Network

Head of National Cybersecurity Protection System explains where DHS is making investments to defend the U.S federal government's network.

Chinese Government Hacking, One Year Later

What has changed in the year since Kevin Mandia first exposed hacking by the Chinese Army?

RSA: Privacy, Secrecy Are Not Synonymous

Privacy officers from Google, Microsoft and Intel Secret discuss privacy in the modern world at this week's RSA conference.

RSA: Enterprise Security's Sucker Punch

Addressing RSA attendees, IDC analysts detail outlook for the current and future IT security landscape.

Is Virtualization Hypervisor a 'Goldilocks Zone' for Security?

VMware aims to position the hypervisor as the 'just right' place to do security.

CA Aims to Improve API Security

Modern Web and mobile apps tend to use external resources, often called via an API, making the API a critical control point for security. That is why CA is addressing API security with new products.

Zscaler Shifts to DNS to Protect Enterprises

Sometimes a full Web proxy is too much, and all you need is DNS re-direction to provide security.

FireEye Still Operating at a Loss, Despite Revenue Growth

Enterprise security firm FireEye grows revenue by 94 percent in 2013. But that increase wasn’t enough for it to turn a profit.

Can Hacker Techniques Defend Financial Security?

At the upcoming RSA Security conference, researchers from Trustwave will detail how financial institutions can use lessons learned from hacker techniques to boost security.

Securing Apps Starts with Code: Sonatype

Sonatype's updated component lifecycle management solution takes aim at the risk of vulnerable open-source software components.

'Air Gap' Attack Is Real Threat

Can sound (not RF or radio waves, but sound) be used to infiltrate and control a PC in a so-called air gap attack?

PCI Compliance Lacking Among Small Businesses

New report shows less than stellar adoption rates for compliance with the PCI Data Security Standard among SMBs. What's going on?

Report: Web Is Largest Source of Malware

Most malware infections come from the Web, making it more dangerous than social media or email, according to a Trustwave study.

FireEye Acquires Mandiant for $1 Billion

Security firms come together in a bid to improve real-time threat detection and response.

Security Big Part of Data Center Modernization Plans

As enterprises look to modernize their data centers, security tops the list of anticipated benefits, finds a new study from Palmer Research and QuinStreet Enterprise. At the same time, it presents some key challenges.

Linux Foundation Aims to Secure Internet of Things

The key to securing the Internet of Things could be in making sure that everything isn't actually connected to the Internet.

Microsoft Battles ZeroAccess Botnet

Microsoft and its partners in law enforcement aim to disrupt the ZeroAccess botnet, one of the most robust botnets in operation today.

Is Docker the Future of Virtualization Security?

Video: Ben Golub, CEO of Docker, explains how Linux container technology presents a very different model for virtual security.