Sean Michael Kerner - ALL ARTICLES - PAGE 1

Secret Double Octopus Raises $6M Series A

January 24, 2017
Multi-factor security firm gets new financial backing as it takes aim at growing share in the authentication market.
READ MORE

Bitglass Raises $45M to Advance CASB Technology

January 9, 2017
Cloud Access Security Broker vendor to use funding to help grow global go-to-market efforts.
READ MORE

Hack the Army - and Get Paid for It

November 16, 2016
The U.S Army is the next branch of the Department of Defence to embrace the bug bounty bounty model in an effort to improve security.
READ MORE

Intel Spins Out McAfee Security Unit in $4.2B Deal

September 7, 2016
Intel sells majority stake in its security unit in a deal that values the former McAfee at $4.2 billion. New majority owner TPG will again use the McAfee name.
READ MORE

Linux Foundation Restructuring CII Security Effort for Scale

August 31, 2016
The CTO of the Linux Foundation discusses how the governance structure for the Core Infrastructure Initiative is changing to promote better security. [VIDEO]
READ MORE

DARPA's Machine Challenge Solves CrackAddr Puzzle

August 11, 2016
Mike Walker, the DARPA program manager responsible for the Cyber Grand Challenge, details how autonomous systems solved a decade-old security challenge. [VIDEO]
READ MORE

Black Hat: What Are the Tools of Car Hacking?

August 8, 2016
Time, energy and money, not a lack of tools, are keeping researchers from investigating automobile security, say Charlie Miller and Chris Valasek. [VIDEO]
READ MORE

Black Hat: Researchers Reveal PIN Pad Risks

August 4, 2016
PIN pads from multiple vendors are potentially at risk from attack, according to researchers from NCR. [VIDEO]
READ MORE

Hacking Hotel Keys and Point of Sale Systems at DEFCON

August 3, 2016
At DEFCON security researcher is set to reveal how magnetic stripes are at risk from exploitation.
READ MORE

The Black Hat Kaminsky DNS Flaw: Eight Years Later

August 2, 2016
At Black Hat 2008, security researcher Dan Kaminsky revealed flaws in DNS that he claimed could have crippled the internet. Eight years later what was the real impact?
READ MORE

BluVector Takes Aim at Security Bug Hunting

June 17, 2016
[VIDEO] Former top IBM security exec, Kris Lovejoy, now president of BluVector by Acuity discusses what her new firm's tech is all about.
READ MORE

Where Should Security Keys be Kept in the Cloud?

May 20, 2016
VIDEO: Andy Ellis, chief security officer at Akamai, discusses his views on cloud security key management and provides a preview of an upcoming Internet security report.
READ MORE

HP Labs in the Post-HP Split Era [VIDEO]

March 22, 2016
Sue Barsamian, senior vice president and general manager of Enterprise Security Products at HPE, discusses HP Labs' role in enterprise security.
READ MORE

Can New Intel Tech Revolutionize Application Security? [VIDEO]

August 4, 2015
Steve Grobman, Intel Fellow and CTO of Intel Security, discusses upcoming innovation in silicon that could have a huge impact on software security.
READ MORE

How Stan Black Secures Citrix and Its Customers [VIDEO]

July 30, 2015
Citrix Chief Security Officer Stan Black discusses how he keeps Citrix and its customers safe, a tough job at a company that sees 22,261 security events per minute on a typical day.
READ MORE

Zimperium Takes Aim at Mobile Security [VIDEO]

July 24, 2015
Smartphone security isn't quite the same as desktop security. Zimperium researchers discuss the pitfalls of mobile and what Zimperium is doing to limit risks.
READ MORE

Do You Need EV-SSL? [VIDEO]

May 9, 2014
The CEO of Comodo, a key contributor to the EV-SSL standard, explains why extended validation SSL matters but why you might not always actually need it.
READ MORE

Microsoft Surprises With Internet Explorer Patch Tuesday Update

February 11, 2014
Microsoft expands the number of security bulletins and tackles 24 vulnerabilities in Internet Explorer.
READ MORE

Code Signing Seen as Effective Way to Safeguard App Security

October 22, 2013
NEWS ANALYSIS: Certificate Authorities (CAs) are ramping up efforts to make code signing the norm for application security.
READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|