Security Trends 

Startup Spotlight: Sift Science's Fraud Prevention Platform

Startup Sift Science wants to take fraud prevention to the next level with its platform powered by machine learning.

Point-of-Sale Security Still a Big Problem

Despite growing EMV adoption, hackers still see point-of-sale (POS) systems as low-hanging fruit.

Can Feds Compromise on Data Privacy?

As hawkish U.S. legislators seek to weaken encryption, a bill up for consideration welcomes private-sector interests to the table for a "dialogue." But is it a trap?

Startup Spotlight: Cymmetria's Cyber Deception Technology

Cymmetria's cyber deception technology turns the tables on bad guys by luring them to decoys where users can track their lateral movements.

3 Cases of InfoSec Hubris That Led to Big Breaches

Hacks happen. But sometimes organizations seem to make themselves targets with behavior that is a bit too boastful, judgmental or egotistical.

How Symantec's New COO Measures Security Success

Mike Fey, president and COO of Symantec, talks about how he will bring the former Blue Coat and Symantec teams together. [VIDEO]

IBM X-Force Red Takes Pen Testing to Next Level

Penetration testing should be about more than hitting a compliance goal.

Linux Foundation Restructuring CII Security Effort for Scale

The CTO of the Linux Foundation discusses how the governance structure for the Core Infrastructure Initiative is changing to promote better security. [VIDEO]

How DevSecOps Will Change Security

DevSecOps will become a common thread in every enterprise security approach, opines Mike Kail, co-founder and chief innovation officer of Cybric.

Should Enterprise Security Software Be under Warranty?

Should enterprise security software offer warranties, much as consumer products and services do?

Using a Neural Network to Improve Social Spear Phishing

Researchers from ZeroFox build a tool that employs neural networks to trick unsuspecting Twitter users.

DARPA's Machine Challenge Solves CrackAddr Puzzle

Mike Walker, the DARPA program manager responsible for the Cyber Grand Challenge, details how autonomous systems solved a decade-old security challenge. [VIDEO]

New IoT Threat Exploits Lack of Encryption in Wireless Keyboards

The researchers who discovered MouseJack reveal a new vulnerability that allows attackers to remotely "sniff" keystrokes of some wireless keyboards.

Startup Spotlight: Twistlock's Container Security

Given a dearth of companies focused on container security, it's no surprise that Twistlock, a container security startup founded by Microsoft veterans, recently raised $10 million.

Why Web Gateways Are Not Enough

Why can't web gateways fully protect you from attack and how can you maximize their performance?

War Gaming's Role in Application Security

War Gaming  teams up developers, operations and security personnel to launch attacks upon their own applications, systems and networks.

Room for Application Security Improvement

Application security suffers from the indiscriminate use of open source software components, finds Sonatype research.

HackerOne Continues to Grow Bug Bounty Business [VIDEO]

Alex Rice, co-founder and CTO of HackerOne, discusses how his firm is growing the bug bounty model.

Startup Spotlight: Demisto's Security Chat-ops Platform

Four McAfee veterans create a security operations platform that combines automation, collaboration and a clever bot.

Making a Case for Security Analytics

Security analytics can help companies get more proactive about their security efforts.

Industry with Worst Web App Security May Surprise You

IT fares the worst of 12 industries in several key application security metrics, finds a WhiteHat Security report. How can IT – and other industries – improve?

How Bad Is Burr-Feinstein Anti-Encryption Legislation?

Proposed anti-encryption legislation known as "Burr-Feinstein," filed in the wake of Apple's legal showdown with the FBI, had broad business ramifications.

LightCyber Shines a Light on Real Threats [VIDEO]

Gonen Fink, CEO of LightCyber, explains how his firm's technology helps solve  a key missing piece of the security alert mystery.

Where Should Security Keys be Kept in the Cloud?

VIDEO: Andy Ellis, chief security officer at Akamai, discusses his views on cloud security key management and provides a preview of an upcoming Internet security report.

Ransomware and the Internet of Things: A Growing Threat

IoT's integration into the world of business, along with the evolution of ransomware, creates the perfect storm for a cybersecurity arms race.