Articles by Sean Michael Kerner 

Can Mobile Apps Defend Themselves? Yes, Says Bluebox

Bluebox's approach goes beyond providing just a security wrapper for mobile applications.

Docker Container Security: What's Next

Docker aims to improve container security with application scanning, user namespaces and other capabilities.

Adobe Patches 17 Flash Vulnerabilities in Latest Update

Adobe's Flash is still heavily favored as a top attack vector, so you'd better update ASAP.

Niara Goes with Flow for Security Analytics

Security analytics must go beyond server logs to the network packet level, says  Niara CEO.

FireEye CEO Sees New Phase of Cyber Threat Cycle

Detente in China's relationship with U.S. could slow security spending, but the long-term trend is still strong.

Privacy by Design Does Not Sacrifice Security

Big Data needs big privacy, says privacy expert at SecTor Security conference.

Google Chrome 46 Boosts Security

Google patches Chrome browser for 24 security issues

Amazon, Google Boost Cloud Security Efforts

Amazon and Google, two of the biggest cloud players, roll out new services in a bid to help cloud users be safer.

Immunio Embeds Security Directly into Applications

Instead of bolting on security, Canadian startup takes an innovative approach that embeds security directly into apps.

Niara Pushes Security Analytics Vision Forward [VIDEO]

After emerging from stealth mode, startup is finding some interesting results in the field.

Splunk Expands Security Tools with New Product Releases

Splunk Enterprise Security 4.0 and Splunk User Behavior Analytics debut.

Symantec Issues Fraudulent Google SSL Cert

Google's Certificate Transparency effort saves the day in case of improperly issued EV-SSL certificate.

IBM Cloud Security Enforcer Emerges from the Shadows

IBM is now entering the shadow IT detection game with a new service for the Cloud Access Security Broker marketplace.

Internet Bug Bounty Helps Secure Open Source and the Internet [VIDEO]

HackerOne co-founder and CTO Alex Rice  discusses what the Internet Bug Bounty is all about.

How Does Security Impact Employee Productivity?

Dell study examines enterprise security's impact on productivity.

How LinkedIn Scales Security [VIDEO]

Cory Scott, director of Information Security at LinkedIn, discusses how the business social network manages security even with a small team.

Why Microsoft Wants to Improve Open Source Security [VIDEO]

Mark Cartwright, group program manager at Microsoft, discusses the intersection between the Security Development Lifecycle and open source software.

Using Passive DNS to Fight Cybercrime

Going after bad guys can lead to unintended Internet collateral damage, but Paul Vixie has some ideas on limiting the risk with DNS.

HP on Legal Hacking and the Law

HP's Zero Day Initiative buys a lot of security vulnerabilities from researchers – so how does it stay within the bounds of the law?

RFID Susceptible to Cloning, Other Hacks

As RFID usage grows, so too do tools to clone and abuse RFID signals.

FBI Details Takedown of Gameover Zeus Botnet

FBI agent explains how law enforcement worked with security vendors to bring down a major botnet operation.

HP ZDI Finds 100 Vulnerabilities in Adobe Reader

HP details how an attacker could potentially abuse Adobe Reader's JavaScript APIs.

Certifigate Flaw Exposes Android Users to Risk [VIDEO]

Remote diagnostic tools from OEMs that are supposed to help Android users, could instead be used to hurt them.

Black Hat Car Hackers Did It as a Hobby [VIDEO]

Hacking a Jeep wasn't part of their day jobs, explain Charlie Miller and Chris Valasek.

Google Doubles Down on Android Security at Black Hat

Google's Android security chief discusses Stagefright and more in Black Hat address.