Security Trends 

The Health Care Data Hacking Problem

Health care data hacking is lucrative for criminals and often tough to detect, which is making it a tough problem to solve.

Is Jailbreaking Apple Devices Always a No-No?

Apple and enterprise IT teams discourage jailbreaking Apple devices – and with good reason. But is jailbreaking always a bad thing?

All about Authentication, Apps for Nymi

Canadian startup Nymi is building a developer ecosystem for its biometric authentication technology.

Niara Goes with Flow for Security Analytics

Security analytics must go beyond server logs to the network packet level, says  Niara CEO.

FireEye CEO Sees New Phase of Cyber Threat Cycle

Detente in China's relationship with U.S. could slow security spending, but the long-term trend is still strong.

Secure IoT from Outset, Experts Say

With use of connected devices on rise, enterprises must address IoT security issues from top down, experts say.

Startup Spotlight: SentinelOne's Endpoint Security

The endpoint is the 'scene of the crime' in enterprise security, so startup SentinelOne targets endpoint security holes left by traditional AV solutions.

How VMI Can Improve Cloud Security

Virtual machine introspection (VMI) offers centralized VM management and other benefits that make it a strong option for cloud security.

Privacy by Design Does Not Sacrifice Security

Big Data needs big privacy, says privacy expert at SecTor Security conference.

CryptoLocker Spawns Endless, Awful Variants

CryptoLocker is the granddaddy of ransomware, and thieves are developing new and more dangerous variants of it.

Using Hadoop to Reduce Security Risks

Using Hadoop and advanced analytics is one option for detecting and deflecting cyber attacks.

Health Care Industry Susceptible to Cyber Attacks

Health care experiences 340 percent more security incidents and attacks than most other industries, finds Raytheon/Websense research.

Immunio Embeds Security Directly into Applications

Instead of bolting on security, Canadian startup takes an innovative approach that embeds security directly into apps.

Who Is Hacking Who – and Why You Need to Know

Will knowing who is attacking them help enterprise security pros mount a better defense?

Video Roundtable: Smart Tech and Security Concerns

Panel of tech journalists will discuss "smart" technologies and security among other topics during a video roundtable focusing on new QuinStreet Enterprise research.

How Does Security Impact Employee Productivity?

Dell study examines enterprise security's impact on productivity.

Startup Spotlight: BitSight Technologies' Risk Management

BitSight Technologies helps companies manage risks associated with third-party suppliers with a ratings service modeled on those offered by credit bureaus.

How LinkedIn Scales Security [VIDEO]

Cory Scott, director of Information Security at LinkedIn, discusses how the business social network manages security even with a small team.

Why Microsoft Wants to Improve Open Source Security [VIDEO]

Mark Cartwright, group program manager at Microsoft, discusses the intersection between the Security Development Lifecycle and open source software.

Will HITRUST Cert Improve Health Care Cybersecurity?

The Health Information Trust Alliance believes certification based on its Common Security Framework will make health care organizations more secure.

Using Passive DNS to Fight Cybercrime

Going after bad guys can lead to unintended Internet collateral damage, but Paul Vixie has some ideas on limiting the risk with DNS.

HP on Legal Hacking and the Law

HP's Zero Day Initiative buys a lot of security vulnerabilities from researchers – so how does it stay within the bounds of the law?

RFID Susceptible to Cloning, Other Hacks

As RFID usage grows, so too do tools to clone and abuse RFID signals.

Don't Ignore Dark Web Dangers

Many businesses do not think they need to worry about the Dark Web, says tech analyst Stephen Arnold. But they are wrong.

Black Hat Car Hackers Did It as a Hobby [VIDEO]

Hacking a Jeep wasn't part of their day jobs, explain Charlie Miller and Chris Valasek.