The Building Security in Maturity Model's sixth edition features recommendations gleaned from software security practices of more than 100 companies.
Canadian startup Nymi is building a developer ecosystem for its biometric authentication technology.
Trend Micro adds intrusion prevention to its security arsenal with HP TippingPoint acquisition.
CryptoLocker is the granddaddy of ransomware, and thieves are developing new and more dangerous variants of it.
Health care experiences 340 percent more security incidents and attacks than most other industries, finds Raytheon/Websense research.
Will knowing who is attacking them help enterprise security pros mount a better defense?
BitSight Technologies helps companies manage risks associated with third-party suppliers with a ratings service modeled on those offered by credit bureaus.
Many businesses do not think they need to worry about the Dark Web, says tech analyst Stephen Arnold. But they are wrong.
BrightPoint Security enables organizations to share threat intelligence with peers – a tactic that has worked well for cybercriminals, points out the company's CEO.
An IEEE study group hopes its research will improve Wi-Fi security.
Prelert first sold its anomaly detection technology to IT operations teams – but then customers begged them to create similar products for enterprise security.
Only 21 percent of respondents continuously monitor user behavior to thwart insider attacks, finds a Crowd Research Partners survey.
Nearly 18 percent of files in enterprise-approved apps violate DLP policies, finds a Netskope study. The worst offender: cloud storage apps.
While enterprise security teams fret about mobile malware, dead and stale apps on users' devices pose a far greater mobile security threat, finds an Appthority report.
Organizations want to build more secure Web applications, but they are having trouble identifying development best practices that really make a difference.
Startup Red Canary's endpoint threat detection platform combines several best-of-breed technologies and a human analyst team.
Only about half of companies offer any kind of security training, a CompTIA survey found.
Millennials more likely than their baby boomer counterparts to engage in risky security behavior, report finds.
Despite the growing importance of applications, the application layer is a "black hole" of enterprise security, says company's co-founder.
Data breaches occur when identity is compromised or misused, which is why Gurucul focuses on identifying anomalous behavior that can point to identity issues.
Fighting malvertising attacks and other tricky exploits is nearly impossible without user education, notes a Cisco security researcher.
Getting customers to share information with each other is a key part of ThreatStream's new spin on threat intelligence, a platform called Optics.
Hackers find new twists for some of their favorite tools, like malware and DDoS, which means organizations need to get even more serious about security in 2015.
The key to smart security spending is assessing your current environment and looking for opportunities for centralization, consolidation and standardization.
Marrying access control to wearable technology will vastly improve user experience while boosting security, says Brivo Labs.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?