Only about half of companies offer any kind of security training, a CompTIA survey found.
Millennials more likely than their baby boomer counterparts to engage in risky security behavior, report finds.
Despite the growing importance of applications, the application layer is a "black hole" of enterprise security, says company's co-founder.
Data breaches occur when identity is compromised or misused, which is why Gurucul focuses on identifying anomalous behavior that can point to identity issues.
Fighting malvertising attacks and other tricky exploits is nearly impossible without user education, notes a Cisco security researcher.
Getting customers to share information with each other is a key part of ThreatStream's new spin on threat intelligence, a platform called Optics.
Hackers find new twists for some of their favorite tools, like malware and DDoS, which means organizations need to get even more serious about security in 2015.
The key to smart security spending is assessing your current environment and looking for opportunities for centralization, consolidation and standardization.
Marrying access control to wearable technology will vastly improve user experience while boosting security, says Brivo Labs.
Recent social engineering attacks involving Dridex malware illustrate the importance of paying attention to older and infrequently used attack vectors.
Symantec's Cyber Career Connection and the Air Force Association's CyberPatriot program both aim to address the cybersecurity skills gap.
While most cloud security startups focus on securing cloud infrastructure, Bitglass protects data traveling between corporate networks and SaaS applications.
Sixty-four percent of companies surveyed by the Ponemon Institute do not believe they have enough budget to adequately secure mobile devices.
Bad guys are using online advertising networks and popular sites like YouTube to serve malware to unsuspecting Internet users, finds new research from Bromium Networks.
As the software-defined data center becomes more common, enterprises are seeking security solutions that are abstracted from the underlying infrastructure.
With connected cars becoming more common, experts say vehicle manufacturers should adopt security best practices used by mobile device makers.
Hackers targeted Microsoft's Internet Explorer with an emerging attack technique called action script spray in the first half of 2014, say Bromium Labs researchers.
Train users to read and heed mobile application permissions, says McAfee Labs.
Israeli startup FortyCloud recently opened a U.S. office to grow its business, which focuses on helping companies secure data in the public cloud.
Retail Cyber Intelligence Sharing Center initiative will make it easy for retailers to share cybersecurity intelligence with each other and with government agencies.
Most IT professionals are stressed out at work, a recent survey suggests. Information security pros are especially stressed, thanks to growing levels of unpredictability.
Most mobile security solutions utilize a traditional endpoint management approach, but not the cloud security service provided by startup Armor5.
Bitglass found that few companies use single sign-on, which the security vendor calls ""the most basic security measure for SaaS adoption."
Alert Logic's annual State of Cloud Security report shows a larger variety of attacks in the cloud, demonstrating the need for more comprehensive approaches to cloud security.
Enterprises with IT security staffs should find it easy to implement the patch for the Heartbleed vulnerability. But small companies may struggle to protect their websites and customers, experts say.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?