dcsimg

Articles by Ann All 

Better Security through Benchmarks

Security by the Numbers aims to offer comparative benchmarks that help companies understand how their security postures stack up against their peers.

Lack of Monitoring Weakens Database Security

Nearly 40 percent of companies cannot monitor databases in real time, a survey finds. This poses a threat to database security, says the survey's sponsor.

Malvertising Gets Nastier with Fingerprint Technique

Malvertising attacks get more targeted, tougher to detect with fingerprinting.

ServiceNow Merges Security with Service Management

Security teams will benefit from its service management platform's workflow, automation, orchestration and systems management capabilities, says ServiceNow.

Attackers Favor Old Exploits, Mobile Apps

HPE's latest Cyber Risk Report finds a shift toward attackers targeting applications, especially mobile ones.

Webcam Hack Shows IoT Security Threat

Researchers hacked a $30 webcam to establish a persistent point of access into a network, giving security pros another concern about the IoT.

6 Mobile Security Predictions for 2016

Big changes for mobile security are ahead in 2016, predict mobile security experts.

10 Cloud Security Predictions for 2016

Cloud security is top of mind for IT professionals in 2016, as organizations migrate more applications to the cloud.

BSIMM's Data-driven Approach to Software Security

The Building Security in Maturity Model's sixth edition features recommendations gleaned from software security practices of more than 100 companies.

All about Authentication, Apps for Nymi

Canadian startup Nymi is building a developer ecosystem for its biometric authentication technology.

Trend Micro Broadens Security Offering with HP TippingPoint Buy

Trend Micro adds intrusion prevention to its security arsenal with HP TippingPoint acquisition.

CryptoLocker Spawns Endless, Awful Variants

CryptoLocker is the granddaddy of ransomware, and thieves are developing new and more dangerous variants of it.

Health Care Industry Susceptible to Cyber Attacks

Health care experiences 340 percent more security incidents and attacks than most other industries, finds Raytheon/Websense research.

Who Is Hacking Who – and Why You Need to Know

Will knowing who is attacking them help enterprise security pros mount a better defense?

Startup Spotlight: BitSight Technologies' Risk Management

BitSight Technologies helps companies manage risks associated with third-party suppliers with a ratings service modeled on those offered by credit bureaus.

Don't Ignore Dark Web Dangers

Many businesses do not think they need to worry about the Dark Web, says tech analyst Stephen Arnold. But they are wrong.

Startup Spotlight: BrightPoint Security's Threat Intelligence Management

BrightPoint Security enables organizations to share threat intelligence with peers – a tactic that has worked well for cybercriminals, points out the company's CEO.

Wi-Fi Security Needs Work, Says IEEE Group

An IEEE study group hopes its research will improve Wi-Fi security.

Startup Spotlight: Prelert's Anomaly Detection

Prelert first sold its anomaly detection technology to IT operations teams – but then customers begged them to create similar products for enterprise security.

Fighting Insider Attacks Is Tough: Survey

Only 21 percent of respondents continuously monitor user behavior to thwart insider attacks, finds a Crowd Research Partners survey.

Cloud Storage's Data Loss Prevention Problem

Nearly 18 percent of files in enterprise-approved apps violate DLP policies, finds a Netskope study. The worst offender: cloud storage apps.

Mobile Apps Live On, Wreak Security Havoc

While enterprise security teams fret about mobile malware, dead and stale apps on users' devices pose a far greater mobile security threat, finds an Appthority report.

Which Web Application Security Best Practice Really Matters?

Organizations want to build more secure Web applications, but they are having trouble identifying development best practices that really make a difference.

Startup Spotlight: Red Canary's Endpoint Security

Startup Red Canary's endpoint threat detection platform combines several best-of-breed technologies and a human analyst team.

Why Isn't User Training a Security Priority?

Only about half of companies offer any kind of security training, a CompTIA survey found.