dcsimg

Articles by Ann All 

New IoT Threat Exploits Lack of Encryption in Wireless Keyboards

The researchers who discovered MouseJack reveal a new vulnerability that allows attackers to remotely "sniff" keystrokes of some wireless keyboards.

Startup Spotlight: Twistlock's Container Security

Given a dearth of companies focused on container security, it's no surprise that Twistlock, a container security startup founded by Microsoft veterans, recently raised $10 million.

Room for Application Security Improvement

Application security suffers from the indiscriminate use of open source software components, finds Sonatype research.

Cisco Gets into CASB Tech with $293M Purchase of CloudLock

Cisco broadens its cloud security business with $293 million acquisition of CloudLock, a provider of cloud access security broker (CASB) technology.

Startup Spotlight: Demisto's Security Chat-ops Platform

Four McAfee veterans create a security operations platform that combines automation, collaboration and a clever bot.

Industry with Worst Web App Security May Surprise You

IT fares the worst of 12 industries in several key application security metrics, finds a WhiteHat Security report. How can IT – and other industries – improve?

Better Security through Benchmarks

Security by the Numbers aims to offer comparative benchmarks that help companies understand how their security postures stack up against their peers.

Lack of Monitoring Weakens Database Security

Nearly 40 percent of companies cannot monitor databases in real time, a survey finds. This poses a threat to database security, says the survey's sponsor.

Malvertising Gets Nastier with Fingerprint Technique

Malvertising attacks get more targeted, tougher to detect with fingerprinting.

ServiceNow Merges Security with Service Management

Security teams will benefit from its service management platform's workflow, automation, orchestration and systems management capabilities, says ServiceNow.

Attackers Favor Old Exploits, Mobile Apps

HPE's latest Cyber Risk Report finds a shift toward attackers targeting applications, especially mobile ones.

Webcam Hack Shows IoT Security Threat

Researchers hacked a $30 webcam to establish a persistent point of access into a network, giving security pros another concern about the IoT.

6 Mobile Security Predictions for 2016

Big changes for mobile security are ahead in 2016, predict mobile security experts.

10 Cloud Security Predictions for 2016

Cloud security is top of mind for IT professionals in 2016, as organizations migrate more applications to the cloud.

BSIMM's Data-driven Approach to Software Security

The Building Security in Maturity Model's sixth edition features recommendations gleaned from software security practices of more than 100 companies.

All about Authentication, Apps for Nymi

Canadian startup Nymi is building a developer ecosystem for its biometric authentication technology.

Trend Micro Broadens Security Offering with HP TippingPoint Buy

Trend Micro adds intrusion prevention to its security arsenal with HP TippingPoint acquisition.

CryptoLocker Spawns Endless, Awful Variants

CryptoLocker is the granddaddy of ransomware, and thieves are developing new and more dangerous variants of it.

Health Care Industry Susceptible to Cyber Attacks

Health care experiences 340 percent more security incidents and attacks than most other industries, finds Raytheon/Websense research.

Who Is Hacking Who – and Why You Need to Know

Will knowing who is attacking them help enterprise security pros mount a better defense?

Startup Spotlight: BitSight Technologies' Risk Management

BitSight Technologies helps companies manage risks associated with third-party suppliers with a ratings service modeled on those offered by credit bureaus.

Don't Ignore Dark Web Dangers

Many businesses do not think they need to worry about the Dark Web, says tech analyst Stephen Arnold. But they are wrong.

Startup Spotlight: BrightPoint Security's Threat Intelligence Management

BrightPoint Security enables organizations to share threat intelligence with peers – a tactic that has worked well for cybercriminals, points out the company's CEO.

Wi-Fi Security Needs Work, Says IEEE Group

An IEEE study group hopes its research will improve Wi-Fi security.

Startup Spotlight: Prelert's Anomaly Detection

Prelert first sold its anomaly detection technology to IT operations teams – but then customers begged them to create similar products for enterprise security.