Intrusion Prevention Systems
Network Access Control
Endpoint Detection and Response
Data Loss Prevention
Enterprise Mobility Management
Mobile Device Management
Threat Intelligence and Analytics
Identity and Access Management
Cloud Security Best Practices
Sean Michael Kerner - Article Archives - Page 1
Secret Double Octopus Raises $6M Series A
January 24, 2017
Multi-factor security firm gets new financial backing as it takes aim at growing share in the authentication market.
Bitglass Raises $45M to Advance CASB Technology
January 9, 2017
Cloud Access Security Broker vendor to use funding to help grow global go-to-market efforts.
Hack the Army - and Get Paid for It
November 16, 2016
The U.S Army is the next branch of the Department of Defence to embrace the bug bounty bounty model in an effort to improve security.
Intel Spins Out McAfee Security Unit in $4.2B Deal
September 7, 2016
Intel sells majority stake in its security unit in a deal that values the former McAfee at $4.2 billion. New majority owner TPG will again use the McAfee name.
Linux Foundation Restructuring CII Security Effort for Scale
August 31, 2016
The CTO of the Linux Foundation discusses how the governance structure for the Core Infrastructure Initiative is changing to promote better security. [VIDEO]
DARPA's Machine Challenge Solves CrackAddr Puzzle
August 11, 2016
Mike Walker, the DARPA program manager responsible for the Cyber Grand Challenge, details how autonomous systems solved a decade-old security challenge. [VIDEO]
Black Hat: What Are the Tools of Car Hacking?
August 8, 2016
Time, energy and money, not a lack of tools, are keeping researchers from investigating automobile security, say Charlie Miller and Chris Valasek. [VIDEO]
Black Hat: Researchers Reveal PIN Pad Risks
August 4, 2016
PIN pads from multiple vendors are potentially at risk from attack, according to researchers from NCR. [VIDEO]
Hacking Hotel Keys and Point of Sale Systems at DEFCON
August 3, 2016
At DEFCON security researcher is set to reveal how magnetic stripes are at risk from exploitation.
The Black Hat Kaminsky DNS Flaw: Eight Years Later
August 2, 2016
At Black Hat 2008, security researcher Dan Kaminsky revealed flaws in DNS that he claimed could have crippled the internet. Eight years later what was the real impact?
BluVector Takes Aim at Security Bug Hunting
June 17, 2016
[VIDEO] Former top IBM security exec, Kris Lovejoy, now president of BluVector by Acuity discusses what her new firm's tech is all about.
Where Should Security Keys be Kept in the Cloud?
May 20, 2016
VIDEO: Andy Ellis, chief security officer at Akamai, discusses his views on cloud security key management and provides a preview of an upcoming Internet security report.
HP Labs in the Post-HP Split Era [VIDEO]
March 22, 2016
Sue Barsamian, senior vice president and general manager of Enterprise Security Products at HPE, discusses HP Labs' role in enterprise security.
Can New Intel Tech Revolutionize Application Security? [VIDEO]
August 4, 2015
Steve Grobman, Intel Fellow and CTO of Intel Security, discusses upcoming innovation in silicon that could have a huge impact on software security.
How Stan Black Secures Citrix and Its Customers [VIDEO]
July 30, 2015
Citrix Chief Security Officer Stan Black discusses how he keeps Citrix and its customers safe, a tough job at a company that sees 22,261 security events per minute on a typical day.
Zimperium Takes Aim at Mobile Security [VIDEO]
July 24, 2015
Smartphone security isn't quite the same as desktop security. Zimperium researchers discuss the pitfalls of mobile and what Zimperium is doing to limit risks.
Do You Need EV-SSL? [VIDEO]
May 9, 2014
The CEO of Comodo, a key contributor to the EV-SSL standard, explains why extended validation SSL matters but why you might not always actually need it.
Microsoft Surprises With Internet Explorer Patch Tuesday Update
February 11, 2014
Microsoft expands the number of security bulletins and tackles 24 vulnerabilities in Internet Explorer.
Code Signing Seen as Effective Way to Safeguard App Security
October 22, 2013
NEWS ANALYSIS: Certificate Authorities (CAs) are ramping up efforts to make code signing the norm for application security.
SECURITY DAILY NEWSLETTER
GET SECURITY NEWS IN YOUR INBOX EVERY DAY
TERMS OF SERVICE
LICENSING AND REPRINTS
Copyright 2017 Quinstreet Inc. All Rights Reserved.