dcsimg

Articles by Ann All 

Don't Ignore Dark Web Dangers

Many businesses do not think they need to worry about the Dark Web, says tech analyst Stephen Arnold. But they are wrong.

Startup Spotlight: BrightPoint Security's Threat Intelligence Management

BrightPoint Security enables organizations to share threat intelligence with peers – a tactic that has worked well for cybercriminals, points out the company's CEO.

Wi-Fi Security Needs Work, Says IEEE Group

An IEEE study group hopes its research will improve Wi-Fi security.

Startup Spotlight: Prelert's Anomaly Detection

Prelert first sold its anomaly detection technology to IT operations teams – but then customers begged them to create similar products for enterprise security.

Fighting Insider Attacks Is Tough: Survey

Only 21 percent of respondents continuously monitor user behavior to thwart insider attacks, finds a Crowd Research Partners survey.

Cloud Storage's Data Loss Prevention Problem

Nearly 18 percent of files in enterprise-approved apps violate DLP policies, finds a Netskope study. The worst offender: cloud storage apps.

Mobile Apps Live On, Wreak Security Havoc

While enterprise security teams fret about mobile malware, dead and stale apps on users' devices pose a far greater mobile security threat, finds an Appthority report.

Which Web Application Security Best Practice Really Matters?

Organizations want to build more secure Web applications, but they are having trouble identifying development best practices that really make a difference.

Startup Spotlight: Red Canary's Endpoint Security

Startup Red Canary's endpoint threat detection platform combines several best-of-breed technologies and a human analyst team.

Why Isn't User Training a Security Priority?

Only about half of companies offer any kind of security training, a CompTIA survey found.

The Millennial Security Risk

Millennials more likely than their baby boomer counterparts to engage in risky security behavior, report finds.

Startup Spotlight: Prevoty's Application Security

Despite the growing importance of applications, the application layer is a "black hole" of enterprise security, says company's co-founder.

Startup Spotlight: Gurucul's Risk Analytics

Data breaches occur when identity is compromised or misused, which is why Gurucul focuses on identifying anomalous behavior that can point to identity issues.

Cisco Security Report Shows Importance of User Education

Fighting malvertising attacks and other tricky exploits is nearly impossible without user education, notes a Cisco security researcher.

Startup Spotlight: ThreatStream's Threat Intelligence Platform

Getting customers to share information with each other is a key part of ThreatStream's new spin on threat intelligence, a platform called Optics.

9 Enterprise Security Trends for 2015

Hackers find new twists for some of their favorite tools, like malware and DDoS, which means organizations need to get even more serious about security in 2015.

Building a Better Security Budget

The key to smart security spending is assessing your current environment and looking for opportunities for centralization, consolidation and standardization.

Wearable Tech Shakes up Access Control

Marrying access control to wearable technology will vastly improve user experience while boosting security, says Brivo Labs.

Dridex and Email: A Nasty Social Engineering Team

Recent social engineering attacks involving Dridex malware illustrate the importance of paying attention to older and infrequently used attack vectors.

Programs Aim to Fill Cybersecurity Skills Gap

Symantec's Cyber Career Connection and the Air Force Association's CyberPatriot program both aim to address the cybersecurity skills gap.

Startup Spotlight: Security-as-a-Service Bitglass

While most cloud security startups focus on securing cloud infrastructure, Bitglass protects data traveling between corporate networks and SaaS applications.

Mobile Security's Budget Shortfall

Sixty-four percent of companies surveyed by the Ponemon Institute do not believe they have enough budget to adequately secure mobile devices.

Malvertising, Online Ad Networks a Dangerous Duo

Bad guys are using online advertising networks and popular sites like YouTube to serve malware to unsuspecting Internet users, finds new research from Bromium Networks.

Startup Spotlight: CloudPassage's Software-defined Security

As the software-defined data center becomes more common, enterprises are seeking security solutions that are abstracted from the underlying infrastructure.

Dude, How Secure Is My Connected Car?

With connected cars becoming more common, experts say vehicle manufacturers should adopt security best practices used by mobile device makers.