Security Trends 

Why All Linux (Security) Bugs Aren't Shallow

With Heartbleed and Shellshock, the open source community realized that Linus' law can be challenged.

Google Blinks on Project Zero Security Disclosure

Common sense prevails as Google relaxes its 90-day disclosure policy for zero-day security vulnerabilities.

Report: PlugX Is RAT of Choice for Nation States

Crowdstrike's Global Threat Intel report details tactics used in nation-state attacks.

Which Cybersecurity Skills Are Hot?

Big data breaches are inspiring employers to pay more for cybersecurity certifications, some experts say.

Cisco Security Report Shows Importance of User Education

Fighting malvertising attacks and other tricky exploits is nearly impossible without user education, notes a Cisco security researcher.

Containerization and the Dawn of Bring Your Own Security

Containerization holds the promise of helping organizations securely move their applications to the cloud.

Startup Spotlight: ThreatStream's Threat Intelligence Platform

Getting customers to share information with each other is a key part of ThreatStream's new spin on threat intelligence, a platform called Optics.

EMV Is No Payment Security Panacea

Implement EMV and you eliminate payment card fraud, right? Wrong.

9 Enterprise Security Trends for 2015

Hackers find new twists for some of their favorite tools, like malware and DDoS, which means organizations need to get even more serious about security in 2015.

Black Friday Cyber Attacks Declined in 2014

While 61 million records were stolen from retailers in 2014, Black Friday and Cyber Monday attacks declined, IBM finds.

Wearable Tech Shakes up Access Control

Marrying access control to wearable technology will vastly improve user experience while boosting security, says Brivo Labs.

Crowdstrike: On a Mission to Find Malware-Free Attacks

Crowdstrike CTO Dmitri Alperovitch explains how his company's newest Falcon platform improves security with detection and prevention.

Dridex and Email: A Nasty Social Engineering Team

Recent social engineering attacks involving Dridex malware illustrate the importance of paying attention to older and infrequently used attack vectors.

Cyber Security's Big Data Problem

Big Data has rendered older security models largely obsolete. The all-in-one product approach that once served the industry well is now inadequate.

Programs Aim to Fill Cybersecurity Skills Gap

Symantec's Cyber Career Connection and the Air Force Association's CyberPatriot program both aim to address the cybersecurity skills gap.

Today's Top 5 Malware Threats

To fight malware, security teams must understand it. Here are five especially nasty forms of malware.

Apple Pay: How Secure Is It?

Apple Pay and other emerging mobile payment methods like Google Wallet possess potential security vulnerabilities, yet they are more secure than credit cards.

Startup Spotlight: Security-as-a-Service Bitglass

While most cloud security startups focus on securing cloud infrastructure, Bitglass protects data traveling between corporate networks and SaaS applications.

The Internet of Things: 3 Security Requirements

As the Internet of Things proliferates, so too do IoT-based vulnerabilities and attacks. These three tips will help secure your IoT-enabled network.

IBM Boosts Cyber Security Education Efforts

IBM is investing in outreach to universities in a bid to better educate future security professionals.

Mobile Security's Budget Shortfall

Sixty-four percent of companies surveyed by the Ponemon Institute do not believe they have enough budget to adequately secure mobile devices.

Shellshock a Fail for Security Disclosure

Shellshock and the Xen vulnerability. One of these things is not like the other, and an expert says they can teach us a lot about how to disclose security vulnerabilities.

Passwords Not Going Away Any Time Soon

While biometric authentication and other password alternatives abound, traditional passwords remain the go-to method of authentication due to low cost.

Malvertising, Online Ad Networks a Dangerous Duo

Bad guys are using online advertising networks and popular sites like YouTube to serve malware to unsuspecting Internet users, finds new research from Bromium Networks.