Startup Sift Science wants to take fraud prevention to the next level with its platform powered by machine learning.
Despite growing EMV adoption, hackers still see point-of-sale (POS) systems as low-hanging fruit.
As hawkish U.S. legislators seek to weaken encryption, a bill up for consideration welcomes private-sector interests to the table for a "dialogue." But is it a trap?
Cymmetria's cyber deception technology turns the tables on bad guys by luring them to decoys where users can track their lateral movements.
Hacks happen. But sometimes organizations seem to make themselves targets with behavior that is a bit too boastful, judgmental or egotistical.
Mike Fey, president and COO of Symantec, talks about how he will bring the former Blue Coat and Symantec teams together. [VIDEO]
Penetration testing should be about more than hitting a compliance goal.
The CTO of the Linux Foundation discusses how the governance structure for the Core Infrastructure Initiative is changing to promote better security. [VIDEO]
DevSecOps will become a common thread in every enterprise security approach, opines Mike Kail, co-founder and chief innovation officer of Cybric.
Should enterprise security software offer warranties, much as consumer products and services do?
Researchers from ZeroFox build a tool that employs neural networks to trick unsuspecting Twitter users.
Mike Walker, the DARPA program manager responsible for the Cyber Grand Challenge, details how autonomous systems solved a decade-old security challenge. [VIDEO]
The researchers who discovered MouseJack reveal a new vulnerability that allows attackers to remotely "sniff" keystrokes of some wireless keyboards.
Given a dearth of companies focused on container security, it's no surprise that Twistlock, a container security startup founded by Microsoft veterans, recently raised $10 million.
Why can't web gateways fully protect you from attack and how can you maximize their performance?
War Gaming teams up developers, operations and security personnel to launch attacks upon their own applications, systems and networks.
Application security suffers from the indiscriminate use of open source software components, finds Sonatype research.
Alex Rice, co-founder and CTO of HackerOne, discusses how his firm is growing the bug bounty model.
Four McAfee veterans create a security operations platform that combines automation, collaboration and a clever bot.
Security analytics can help companies get more proactive about their security efforts.
IT fares the worst of 12 industries in several key application security metrics, finds a WhiteHat Security report. How can IT – and other industries – improve?
Proposed anti-encryption legislation known as "Burr-Feinstein," filed in the wake of Apple's legal showdown with the FBI, had broad business ramifications.
Gonen Fink, CEO of LightCyber, explains how his firm's technology helps solve a key missing piece of the security alert mystery.
VIDEO: Andy Ellis, chief security officer at Akamai, discusses his views on cloud security key management and provides a preview of an upcoming Internet security report.
IoT's integration into the world of business, along with the evolution of ransomware, creates the perfect storm for a cybersecurity arms race.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?