How-Tos 

5 Best Practices for Reducing Third-Party Security Risks

Vendors and other third-party partners have caused some big data breaches. Here is how to keep it from happening to you.

5 Security Tips for Moving SharePoint to Cloud

Switching from on-premises SharePoint to SharePoint Online can be tricky from a security standpoint.

How to Fight Advanced Persistent Threats

Improving security policies, procedures and configurations is the first, and most important, step in defeating advanced persistent threats (APTs).

How to Set up a Successful Bug Bounty Program [VIDEO]

What does it take to run a successful bug bounty program?

5 Ways to Fight Nation-State Attacks

State-sponsored cyber-attacks are tough to stop. Remaining vigilant is the key.

Procuring Security Tech a Hassle? These 9 Tips Will Help

Procuring enterprise security technology can be tricky. A government CISO offers nine tips that will help the procurement process go smoothly.

BSIMM's Data-driven Approach to Software Security

The Building Security in Maturity Model's sixth edition features recommendations gleaned from software security practices of more than 100 companies.

How to Secure Corporate Data in Post-Perimeter World

Four simple steps can help organizations secure business data outside the firewall.

TrueCrypt Travails Continue

Two serious bugs later, almost no one thinks it is a good idea to use TrueCrypt. But what are your options?

Unlocking Smartphones: PINs, Patterns or Fingerprints?

PINs, patterns and fingerprints are all options for unlocking mobile devices. But which option is most secure?

Europe's Data Protection Regs: What You Need to Know

Europe's data protection rules are about to get more strict, under legislation being drafted by the European Commission. Several rules relate to cloud data.

Apple Watch Security Risks (and Benefits)

With the Apple Watch, as with smartphones before it, security pros need to proactively prepare for the mobile device's entry into the workplace.

How to Fight Zombie App-ocalypse

"Zombie" apps are an often overlooked BYOD security threat. User education and application whitelisting can reduce risks associated with these dead and stale apps.

Using Two-Factor Authentication for Mobile Security

Reduce the likelihood of having your mobile device hacked by using two-factor authentication.

3 Ways to Mitigate Insider Security Risk

As recent data breaches show, every organization needs to take action to better secure insider access, particularly that of privileged users and contractors.

How to Choose the Right Security Testing Tool

Picking the right tool is a critical part of application security.

How to Mitigate Security Risks from Third-Party Providers

Vendor application security testing is a key practice to help companies ensure that third-party software meets their security standards.

How IKEA Does PCI-DSS

Attaining PCI-DSS compliance is no easy task, but IKEA's common sense approach makes it a bit less taxing.

How to Build an Adaptive Security Culture

What can Bruce Lee teach your security team about dealing with cyber threats?

4 Lessons Learned from the POODLE Hack

Doggedly pursuing security best practices will help organizations beat vulnerabilities like POODLE.

Are Your Databases Secure? Think Again

Targeting enterprise databases is a common attack tactic, as the Anthem breach showed, yet many companies neglect database security.

20 Top Security Influencers

It can be tough to know where to go for the latest enterprise security news and actionable advice. This list of influencers is a great place to start.

Windows 10: Securing Identity, Information and Devices

Windows 10 includes some goodies for enterprise security professionals.

Integrating Bulletproof Security into App Development

Application security should never be an afterthought. SoftServe's Nazar Tymoshyk offers advice on building secure software.

Phone Scams Getting More Sophisticated

Even folks who know better can fall for sophisticated phone scams that leverage personal information.