The researchers who discovered MouseJack reveal a new vulnerability that allows attackers to remotely "sniff" keystrokes of some wireless keyboards.
Given a dearth of companies focused on container security, it's no surprise that Twistlock, a container security startup founded by Microsoft veterans, recently raised $10 million.
Why can't web gateways fully protect you from attack and how can you maximize their performance?
War Gaming teams up developers, operations and security personnel to launch attacks upon their own applications, systems and networks.
Application security suffers from the indiscriminate use of open source software components, finds Sonatype research.
Alex Rice, co-founder and CTO of HackerOne, discusses how his firm is growing the bug bounty model.
Four McAfee veterans create a security operations platform that combines automation, collaboration and a clever bot.
Security analytics can help companies get more proactive about their security efforts.
IT fares the worst of 12 industries in several key application security metrics, finds a WhiteHat Security report. How can IT – and other industries – improve?
Proposed anti-encryption legislation known as "Burr-Feinstein," filed in the wake of Apple's legal showdown with the FBI, had broad business ramifications.
Gonen Fink, CEO of LightCyber, explains how his firm's technology helps solve a key missing piece of the security alert mystery.
VIDEO: Andy Ellis, chief security officer at Akamai, discusses his views on cloud security key management and provides a preview of an upcoming Internet security report.
IoT's integration into the world of business, along with the evolution of ransomware, creates the perfect storm for a cybersecurity arms race.
Weigh benefits of IoT devices against potential security risks to determine on a device-by-device basis if the technology should be used, experts advise.
Paul Paget, CEO of Pwnie Express, discusses how his company is evolving to meet the next generation of threats and what is driving the business forward.
Nearly 40 percent of companies cannot monitor databases in real time, a survey finds. This poses a threat to database security, says the survey's sponsor.
Startup founded by nCircle veterans uses approach modeled on DNA markers to identify and shut down cyber attacks.
U.S. retailers are in no hurry to transition to EMV, surveys find. What is holding them back?
To combat malware, vectors must be secured. Start with these five malware vectors that are highly popular with hackers.
PODCAST: Threat intelligence is great, but will getting actionable alerts over Slack improve enterprise security?
Sue Barsamian, senior vice president and general manager of Enterprise Security Products at HPE, discusses HP Labs' role in enterprise security.
Malvertising attacks get more targeted, tougher to detect with fingerprinting.
Does Mozilla's decision to shut down its Persona identity management system tell us anything about the future of identity management?
Ponemon Institute study sponsored by IBM reveals application security shortcomings.
Startup uses artificial intelligence to fight APTs, zero day attacks and other advanced threats.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?