Nearly 40 percent of companies cannot monitor databases in real time, a survey finds. This poses a threat to database security, says the survey's sponsor.
Malvertising attacks get more targeted, tougher to detect with fingerprinting.
Security teams will benefit from its service management platform's workflow, automation, orchestration and systems management capabilities, says ServiceNow.
HPE's latest Cyber Risk Report finds a shift toward attackers targeting applications, especially mobile ones.
Researchers hacked a $30 webcam to establish a persistent point of access into a network, giving security pros another concern about the IoT.
Big changes for mobile security are ahead in 2016, predict mobile security experts.
Cloud security is top of mind for IT professionals in 2016, as organizations migrate more applications to the cloud.
The Building Security in Maturity Model's sixth edition features recommendations gleaned from software security practices of more than 100 companies.
Canadian startup Nymi is building a developer ecosystem for its biometric authentication technology.
Trend Micro adds intrusion prevention to its security arsenal with HP TippingPoint acquisition.
CryptoLocker is the granddaddy of ransomware, and thieves are developing new and more dangerous variants of it.
Health care experiences 340 percent more security incidents and attacks than most other industries, finds Raytheon/Websense research.
Will knowing who is attacking them help enterprise security pros mount a better defense?
BitSight Technologies helps companies manage risks associated with third-party suppliers with a ratings service modeled on those offered by credit bureaus.
Many businesses do not think they need to worry about the Dark Web, says tech analyst Stephen Arnold. But they are wrong.
BrightPoint Security enables organizations to share threat intelligence with peers – a tactic that has worked well for cybercriminals, points out the company's CEO.
An IEEE study group hopes its research will improve Wi-Fi security.
Prelert first sold its anomaly detection technology to IT operations teams – but then customers begged them to create similar products for enterprise security.
Only 21 percent of respondents continuously monitor user behavior to thwart insider attacks, finds a Crowd Research Partners survey.
Nearly 18 percent of files in enterprise-approved apps violate DLP policies, finds a Netskope study. The worst offender: cloud storage apps.
While enterprise security teams fret about mobile malware, dead and stale apps on users' devices pose a far greater mobile security threat, finds an Appthority report.
Organizations want to build more secure Web applications, but they are having trouble identifying development best practices that really make a difference.
Startup Red Canary's endpoint threat detection platform combines several best-of-breed technologies and a human analyst team.
Only about half of companies offer any kind of security training, a CompTIA survey found.
Millennials more likely than their baby boomer counterparts to engage in risky security behavior, report finds.
- Apr 2016
- Mar 2016
- Feb 2016
- Jan 2016
- Dec 2015
- Nov 2015
- Oct 2015
- Sep 2015
- Aug 2015
- Jul 2015
- Jun 2015
- May 2015
- Apr 2015
- Mar 2015
- Jan 2015
- Dec 2014
- Nov 2014
- Oct 2014
- Sep 2014
- Aug 2014
- Jul 2014
- Jun 2014
- May 2014
- Apr 2014
- Jan 2014
- Dec 2013
- Nov 2013
- Oct 2013
- Sep 2013
- Aug 2013
- Feb 2013
- Jan 2013
- Oct 2012
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?