Articles by Sean Michael Kerner 

Google Project Zero Focuses on Internet Security

Months after reporting its first vulnerabilities, Google officially acknowledges the existence of a shadowy security group known as Project Zero.

How to Reduce Use-After-Free Memory Risk

Use-after-free memory errors often crop up in software application code.

Boleto Malware Hits Brazil Payment System

New IBM Trusteer research finds new variants of malware used to exploit Brazil's Boleto payment system.

Bromium CTO Explains Promise of Secure by Design

Simon Crosby, Co-founder and CTO of Bromium, details his company's progress to deliver a Byzantine Fault Tolerant security solution

HP Atalla Tackles Encryption in the Post-Snowden Era

The need for encryption now is greater than ever.

The Link between Windows XP Users and Spam Volume

Second quarter IBM X-Force Threat Intelligence report finds an uptick in spam volume.

IBM Patents Browser-Based Fraud Detection Technology

What you do in your browser now forms a second factor of authentication for e-commerce transactions, thanks to IBM.

IBM Takes Aim at Endpoint Security with Trusteer Apex

In a world where anti-virus is no longer entirely effective, IBM launches new technology to secure endpoint devices.

How Should Enterprises Score Security? [VIDEO]

Qualys CTO Wolfgang Kandek discusses his firm's Web application firewall and security scoring efforts and hints at future security technologies to come.

[VIDEO] Where Are Database Threats Today?

Amichai Shulman, CTO of Imperva, explains why SQL injection is not a database threat and discusses the current state of Oracle database patching.

[VIDEO] Dr. Larry Ponemon on How Security Survey Research Is Done

Head of the Ponemon Institute details the process and the challenges of conducting modern security surveys.

How to Limit Heartbleed Risk Today

What can you do to reduce your risk from Heartbleed? eSecurity Planet has got you covered.

ATMs on Windows XP: How Risky Is It?

Microsoft has ended official support for Windows XP. What does that mean for the security of the world's ATMs, most of which run XP?

Does Your Organization Need a Chief Trust Officer? [VIDEO]

VIDEO: Is Cognitive Injection the Key to Real Security?

Andy Ellis, chief security officer at Akamai, thinks that taking a positive approach to security tasks will result in better security outcomes.

VIDEO: Bruce Schneier on Incident Response and His Next Book

Bruce Schneier explains the role that incident response technology should play in the modern IT security landscape.

Touchlogging Represents a Real Mobile Risk

Trustwave researcher warns about the risk of touchlogger applications on IOS and Android

Can Cloud Services be Exploited to Aid Attackers?

Researchers reveal how they can leverage free cloud services as an efficient attack platform without spending any money.

Inside the U.S Department of Homeland Security's Network

Head of National Cybersecurity Protection System explains where DHS is making investments to defend the U.S federal government's network.

Chinese Government Hacking, One Year Later

What has changed in the year since Kevin Mandia first exposed hacking by the Chinese Army?

RSA: Privacy, Secrecy Are Not Synonymous

Privacy officers from Google, Microsoft and Intel Secret discuss privacy in the modern world at this week's RSA conference.

RSA: Enterprise Security's Sucker Punch

Addressing RSA attendees, IDC analysts detail outlook for the current and future IT security landscape.

Is Virtualization Hypervisor a 'Goldilocks Zone' for Security?

VMware aims to position the hypervisor as the 'just right' place to do security.

CA Aims to Improve API Security

Modern Web and mobile apps tend to use external resources, often called via an API, making the API a critical control point for security. That is why CA is addressing API security with new products.

Zscaler Shifts to DNS to Protect Enterprises

Sometimes a full Web proxy is too much, and all you need is DNS re-direction to provide security.