Bluebox's approach goes beyond providing just a security wrapper for mobile applications.
Docker aims to improve container security with application scanning, user namespaces and other capabilities.
Adobe's Flash is still heavily favored as a top attack vector, so you'd better update ASAP.
Security analytics must go beyond server logs to the network packet level, says Niara CEO.
Detente in China's relationship with U.S. could slow security spending, but the long-term trend is still strong.
Big Data needs big privacy, says privacy expert at SecTor Security conference.
Google patches Chrome browser for 24 security issues
Amazon and Google, two of the biggest cloud players, roll out new services in a bid to help cloud users be safer.
Instead of bolting on security, Canadian startup takes an innovative approach that embeds security directly into apps.
After emerging from stealth mode, startup is finding some interesting results in the field.
Splunk Enterprise Security 4.0 and Splunk User Behavior Analytics debut.
Google's Certificate Transparency effort saves the day in case of improperly issued EV-SSL certificate.
IBM is now entering the shadow IT detection game with a new service for the Cloud Access Security Broker marketplace.
HackerOne co-founder and CTO Alex Rice discusses what the Internet Bug Bounty is all about.
Dell study examines enterprise security's impact on productivity.
Cory Scott, director of Information Security at LinkedIn, discusses how the business social network manages security even with a small team.
Mark Cartwright, group program manager at Microsoft, discusses the intersection between the Security Development Lifecycle and open source software.
Going after bad guys can lead to unintended Internet collateral damage, but Paul Vixie has some ideas on limiting the risk with DNS.
HP's Zero Day Initiative buys a lot of security vulnerabilities from researchers – so how does it stay within the bounds of the law?
As RFID usage grows, so too do tools to clone and abuse RFID signals.
FBI agent explains how law enforcement worked with security vendors to bring down a major botnet operation.
Remote diagnostic tools from OEMs that are supposed to help Android users, could instead be used to hurt them.
Hacking a Jeep wasn't part of their day jobs, explain Charlie Miller and Chris Valasek.
Google's Android security chief discusses Stagefright and more in Black Hat address.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?