Cymmetria's cyber deception technology turns the tables on bad guys by luring them to decoys where users can track their lateral movements.
Intel Security and Kaspersky Labs worked with international law enforcement agencies on a website that offers decryption keys for several variants of ransomware.
The researchers who discovered MouseJack reveal a new vulnerability that allows attackers to remotely "sniff" keystrokes of some wireless keyboards.
Given a dearth of companies focused on container security, it's no surprise that Twistlock, a container security startup founded by Microsoft veterans, recently raised $10 million.
Application security suffers from the indiscriminate use of open source software components, finds Sonatype research.
Cisco broadens its cloud security business with $293 million acquisition of CloudLock, a provider of cloud access security broker (CASB) technology.
Four McAfee veterans create a security operations platform that combines automation, collaboration and a clever bot.
IT fares the worst of 12 industries in several key application security metrics, finds a WhiteHat Security report. How can IT – and other industries – improve?
Security by the Numbers aims to offer comparative benchmarks that help companies understand how their security postures stack up against their peers.
Nearly 40 percent of companies cannot monitor databases in real time, a survey finds. This poses a threat to database security, says the survey's sponsor.
Malvertising attacks get more targeted, tougher to detect with fingerprinting.
Security teams will benefit from its service management platform's workflow, automation, orchestration and systems management capabilities, says ServiceNow.
HPE's latest Cyber Risk Report finds a shift toward attackers targeting applications, especially mobile ones.
Researchers hacked a $30 webcam to establish a persistent point of access into a network, giving security pros another concern about the IoT.
Big changes for mobile security are ahead in 2016, predict mobile security experts.
Cloud security is top of mind for IT professionals in 2016, as organizations migrate more applications to the cloud.
The Building Security in Maturity Model's sixth edition features recommendations gleaned from software security practices of more than 100 companies.
Canadian startup Nymi is building a developer ecosystem for its biometric authentication technology.
Trend Micro adds intrusion prevention to its security arsenal with HP TippingPoint acquisition.
CryptoLocker is the granddaddy of ransomware, and thieves are developing new and more dangerous variants of it.
Health care experiences 340 percent more security incidents and attacks than most other industries, finds Raytheon/Websense research.
Will knowing who is attacking them help enterprise security pros mount a better defense?
BitSight Technologies helps companies manage risks associated with third-party suppliers with a ratings service modeled on those offered by credit bureaus.
Many businesses do not think they need to worry about the Dark Web, says tech analyst Stephen Arnold. But they are wrong.
BrightPoint Security enables organizations to share threat intelligence with peers – a tactic that has worked well for cybercriminals, points out the company's CEO.
- Sep 2016
- Aug 2016
- Jul 2016
- Jun 2016
- May 2016
- Apr 2016
- Mar 2016
- Feb 2016
- Jan 2016
- Dec 2015
- Nov 2015
- Oct 2015
- Sep 2015
- Aug 2015
- Jul 2015
- Jun 2015
- May 2015
- Apr 2015
- Mar 2015
- Jan 2015
- Dec 2014
- Nov 2014
- Oct 2014
- Sep 2014
- Aug 2014
- Jul 2014
- Jun 2014
- May 2014
- Apr 2014
- Jan 2014
- Dec 2013
- Nov 2013
- Oct 2013
- Sep 2013
- Aug 2013
- Feb 2013
- Jan 2013
- Oct 2012
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?