Security Trends 

Incident Response: How to Prepare for Attacks and Breaches

Make sure your organization is prepared for attacks and breaches by putting together an incident response plan and incident response team.

Threat Intelligence and Analytics: Staying Ahead of Cyber Criminals

Threat intelligence is the best way to stay one step ahead of cyber criminals and prevent information or financial losses. We offer a thorough overview of cyber threat intelligence and how to implement it in your business.

Multi-Factor Authentication: A Critical Security Tool for Enterprises

Multi-factor authentication provides a more secure option than passwords and ID alone. We take a comprehensive look at MFA security, two-factor authentication, mobile authentication, biometrics and vendors, and issues to consider before adopting an MFA solution.

Where Do Venture Capitalists See Security Opportunities?

VCs from Trident Capital Cybersecurity, Elephant, Glasswing Ventures and Ten Eleven Ventures discuss where they see the opportunity to profit.

RSA 2017: IT Security Teams Face an Uphill Battle

Today's businesses are journeying into treacherous territory with too few security professionals behind the wheel.

RSA Conference Security Panel Isn't Worried about GDPR

Lawyers from Google, Cisco and Microsoft talk about privacy and why they're confident they're all moving in the right direction.

4 Ways to Upgrade Your Threat Sharing

Top InfoSec brass spoke at the 2016 Advanced Cyber Security Center conference on the importance of collaborative threat sharing.

Vulnerable Voting Machines Yet Another IoT Device to Secure

The growth of internet-connected devices, including voting machines, means security pros must pay more attention to software vulnerability management.

Hacking the Presidential Election: Can It Happen?

Hackers can leverage lots of technical vulnerabilities to affect election results. But a coordinated attack would be tough, due to voting systems' fragmented nature.

Startup Spotlight: Sift Science's Fraud Prevention Platform

Startup Sift Science wants to take fraud prevention to the next level with its platform powered by machine learning.

Point-of-Sale Security Still a Big Problem

Despite growing EMV adoption, hackers still see point-of-sale (POS) systems as low-hanging fruit.

Can Feds Compromise on Data Privacy?

As hawkish U.S. legislators seek to weaken encryption, a bill up for consideration welcomes private-sector interests to the table for a "dialogue." But is it a trap?

Startup Spotlight: Cymmetria's Cyber Deception Technology

Cymmetria's cyber deception technology turns the tables on bad guys by luring them to decoys where users can track their lateral movements.

3 Cases of InfoSec Hubris That Led to Big Breaches

Hacks happen. But sometimes organizations seem to make themselves targets with behavior that is a bit too boastful, judgmental or egotistical.

How Symantec's New COO Measures Security Success

Mike Fey, president and COO of Symantec, talks about how he will bring the former Blue Coat and Symantec teams together. [VIDEO]

IBM X-Force Red Takes Pen Testing to Next Level

Penetration testing should be about more than hitting a compliance goal.

Linux Foundation Restructuring CII Security Effort for Scale

The CTO of the Linux Foundation discusses how the governance structure for the Core Infrastructure Initiative is changing to promote better security. [VIDEO]



How DevSecOps Will Change Security

DevSecOps will become a common thread in every enterprise security approach, opines Mike Kail, co-founder and chief innovation officer of Cybric.

Should Enterprise Security Software Be under Warranty?

Should enterprise security software offer warranties, much as consumer products and services do?

Using a Neural Network to Improve Social Spear Phishing

Researchers from ZeroFox build a tool that employs neural networks to trick unsuspecting Twitter users.

DARPA's Machine Challenge Solves CrackAddr Puzzle

Mike Walker, the DARPA program manager responsible for the Cyber Grand Challenge, details how autonomous systems solved a decade-old security challenge. [VIDEO]

New IoT Threat Exploits Lack of Encryption in Wireless Keyboards

The researchers who discovered MouseJack reveal a new vulnerability that allows attackers to remotely "sniff" keystrokes of some wireless keyboards.

Startup Spotlight: Twistlock's Container Security

Given a dearth of companies focused on container security, it's no surprise that Twistlock, a container security startup founded by Microsoft veterans, recently raised $10 million.

Why Web Gateways Are Not Enough

Why can't web gateways fully protect you from attack and how can you maximize their performance?

War Gaming's Role in Application Security

War Gaming  teams up developers, operations and security personnel to launch attacks upon their own applications, systems and networks.